Metasploit mailing list archives

windows/meterepreter/reverse_https handler hangs


From: Miguel Rios <miguelrios35 () yahoo com>
Date: Mon, 13 Dec 2010 07:33:22 -0800 (PST)

Did anyone ever figure out why the windows/meterepreter/reverse_https 
handler started to hang? I remember seeing something in the list awhile 
ago but I don't recall seeing any solution.
i just tried it again and it once again seems to hang as its patching the dll? 

[*] [2010.12.10-16:28:33] Started HTTPS reverse handler on https://0.0.0.0:443/
[*] [2010.12.10-16:28:33] Starting the payload handler...
msf exploit(handler) > [*] [2010.12.10-16:29:41] xx.xx.xx.xx:48430 Request received for /A6xFN...
[*] [2010.12.10-16:29:41] xx.xx.xx.xx:48430 Staging connection for target 6xFN received...
[*] [2010.12.10-16:29:41] Patching Target ID 6xFN into DLL

Any
 ideas why it's no longer working? The regular reverse_tcp works fine, 
but I rather use https to traverse firewalls and what not.

thanks


      
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: