Metasploit mailing list archives

Re: linux/x86/metsvc_reverse_tcp results 0 bytes long


From: egypt () metasploit com
Date: Mon, 10 May 2010 03:22:16 -0600

metcsvc isn't a real payload, it's just a stub to connect to the
metsvc exe which can be found in ./data/meterpreter/metsvc.exe .  If
you need to change the hardcoded port that it listens on, the source
is in ./external/source/metsvc/src/

Hope this helped,
egypt

On Mon, May 10, 2010 at 2:05 AM, Konrads Smelkovs <konrads () smelkovs com> wrote:
konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp
LHOST=127.0.0.1 LPORT=8081 X >out.elf
Created by msfpayload (http://www.metasploit.com).
Payload: linux/x86/metsvc_reverse_tcp
Ā Length: 0
Options: LHOST=127.0.0.1,LPORT=8081
konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp
LHOST=127.0.0.1 LPORT=8081 P
# linux/x86/metsvc_reverse_tcp - 0 bytes
# http://www.metasploit.com
# AutoRunScript=, LHOST=127.0.0.1, AppendExit=false,
# AutoSystemInfo=true, PrependChrootBreak=false,
# PrependSetresuid=false, InitialAutoRunScript=,
# AutoLoadStdapi=true, PrependSetuid=false, LPORT=8081,
# ReverseConnectRetries=5, PrependSetreuid=false
my $buf =

What am I doing wrong?
--
Konrads Smelkovs
Applied IT sorcery.

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: