Home page logo
/

metasploit logo Metasploit mailing list archives

linux/x86/metsvc_reverse_tcp results 0 bytes long
From: Konrads Smelkovs <konrads () smelkovs com>
Date: Mon, 10 May 2010 11:05:38 +0300

konrads () konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp
LHOST=127.0.0.1 LPORT=8081 X >out.elf
Created by msfpayload (http://www.metasploit.com).
Payload: linux/x86/metsvc_reverse_tcp
* Length: 0*
Options: LHOST=127.0.0.1,LPORT=8081
konrads () konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp
LHOST=127.0.0.1 LPORT=8081 P
# linux/x86/metsvc_reverse_tcp - 0 bytes
# http://www.metasploit.com
# AutoRunScript=, LHOST=127.0.0.1, AppendExit=false,
# AutoSystemInfo=true, PrependChrootBreak=false,
# PrependSetresuid=false, InitialAutoRunScript=,
# AutoLoadStdapi=true, PrependSetuid=false, LPORT=8081,
# ReverseConnectRetries=5, PrependSetreuid=false
*my $buf = *

What am I doing wrong?
--
Konrads Smelkovs
Applied IT sorcery.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]