Metasploit mailing list archives
bug with ms06_040/meterpreter payload
From: Robin Wood <robin () digininja org>
Date: Fri, 19 Nov 2010 12:31:59 +0000
Not having much luck today, just got this on ms06_040_netapi [*] Started reverse handler on 192.168.0.2:4444 [*] Binding to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER] ... [*] Bound to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER] ... [*] Building the stub data... [-] Exploit exception: undefined method `name' for nil:NilClass [*] Exploit completed, but no session was created. Going for meterpreter bind or reverse tcp. Robin _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- bug with ms06_040/meterpreter payload Robin Wood (Nov 19)
- Re: bug with ms06_040/meterpreter payload HD Moore (Nov 19)
- Re: bug with ms06_040/meterpreter payload Robin Wood (Nov 19)
- Re: bug with ms06_040/meterpreter payload HD Moore (Nov 19)