Metasploit mailing list archives

Re: passing LHOST IP on command line


From: Jonathan Cran <jcran () 0x0e org>
Date: Wed, 10 Nov 2010 10:03:18 -0600

On 11/10/2010 04:41 AM, Robin Wood wrote:
Is it possible to build a reverse meterpreter exe that will take its
LHOST as a command line argument rather than being hard coded?

If you already have a session on the box, it sounds like a good
candidate for Carlos's new multi_meterpreter_inject. Usage:

meterpreter > run multi_meter_inject -h
Meterpreter Script for injecting a reverce tcp Meterpreter Payload
in to memory of multiple PID's, if none is provided a notepad process.
will be created and a Meterpreter Payload will be injected in to each.

OPTIONS:

    -h        Help menu.
    -m        Start Exploit multi/hadler for return connection
    -mp <opt>  Provide Multiple PID for connections separated by comma one per IP.
    -mr <opt>  Provide Multiple IP Addresses for Connections separated by comma.
    -p <opt>  The port on the remote host where Metasploit is listening (default: 4444)
    -pt <opt>  Specify Reverse Connection Meterpreter Payload. Default windows/meterpreter/reverse_tcp


Hope it helps!

jcran

-- 
Jonathan Cran
jcran () 0x0e org
515.890.0070

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: