Metasploit mailing list archives
windows/meterepreter/reverse_https handler hangs
From: Miguel Rios <miguelrios35 () yahoo com>
Date: Mon, 13 Dec 2010 07:33:22 -0800 (PST)
Did anyone ever figure out why the windows/meterepreter/reverse_https handler started to hang? I remember seeing something in the list awhile ago but I don't recall seeing any solution. i just tried it again and it once again seems to hang as its patching the dll? [*] [2010.12.10-16:28:33] Started HTTPS reverse handler on https://0.0.0.0:443/ [*] [2010.12.10-16:28:33] Starting the payload handler... msf exploit(handler) > [*] [2010.12.10-16:29:41] xx.xx.xx.xx:48430 Request received for /A6xFN... [*] [2010.12.10-16:29:41] xx.xx.xx.xx:48430 Staging connection for target 6xFN received... [*] [2010.12.10-16:29:41] Patching Target ID 6xFN into DLL Any ideas why it's no longer working? The regular reverse_tcp works fine, but I rather use https to traverse firewalls and what not. thanks
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- windows/meterepreter/reverse_https handler hangs Miguel Rios (Dec 13)
- <Possible follow-ups>
- Re: windows/meterepreter/reverse_https handler hangs Miguel Rios (Dec 15)