Metasploit mailing list archives

bug with ms06_040/meterpreter payload


From: Robin Wood <robin () digininja org>
Date: Fri, 19 Nov 2010 12:31:59 +0000

Not having much luck today, just got this on ms06_040_netapi

[*] Started reverse handler on 192.168.0.2:4444
[*] Binding to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER]
...
[*] Bound to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER]
...
[*] Building the stub data...
[-] Exploit exception: undefined method `name' for nil:NilClass
[*] Exploit completed, but no session was created.

Going for meterpreter bind or reverse tcp.

Robin
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: