Home page logo

metasploit logo Metasploit mailing list archives

Exploit::Remote::HttpClient and stages
From: hdm at metasploit.com (H D Moore)
Date: Sun, 25 Mar 2007 18:10:26 -0500

Are you calling the handler() function inside your module?

On Sunday 25 March 2007 18:09, Nicob wrote:
In one of my exploit, findsock payloads never work. When capturing the
trafic, I see the cmd.exe prompt which is correctly sent back over the
previously established connection and the "echo" test done by
_check_shell(), but msfcli didn't "catch" the shell :

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]