Metasploit mailing list archives

Re: need help with ddwrt_cgibin_exec exploit


From: egypt () metasploit com
Date: Mon, 12 Jul 2010 11:35:46 -0600

On Mon, Jul 12, 2010 at 11:08 AM, HD Moore <hdm () metasploit com> wrote:
On 7/12/2010 12:07 PM, Binoy Dalal wrote:
i tried running ddwrt_cgibin_exec exploit against a remote server, i
filled in the rhost,lhost,lport=80 set the payload to
generic/shell_reverse_tcp
after putting in exploit a message saying "handler failed to bind to <my
IP>" is generated and then this is displayed
[*] Sending GET request with encoded command line...
[*] Giving the handler time to run...
[*] Exploit completed, but no session was created.


LPORT is the port on your machine to connect back, LHOST is the IP of
your machine. Make sure these are both accessible to the target.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



That message is also common when the server is not vulnerable.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: