Home page logo
/

metasploit logo Metasploit mailing list archives

Exploit::Remote::HttpClient and stages
From: Olivier.Dembour at hsc.fr (Olivier Dembour)
Date: Sun, 11 Mar 2007 15:52:56 +0100

mmiller at hick.org a ?crit :

Just make sure that you call handler after you trigger the bug.  This
will grab the socket used by the global HTTP client connection and try
to use that to stage the payload over.  Let us know if you run into
problems with this, since findsock payloads have thus far not been used
all that much.

Thanks for your reply,

HTTPClient handler works well with standard payloads (reverse tcp, exec). The
problem is only with findsock like payload

-- 
Olivier Dembour ++ Olivier.Dembour at hsc.fr
Herv? Schauer Consultants -- http://www.hsc.fr/



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault