Metasploit mailing list archives

msfpayload backdoor


From: wullie19 at ntlworld.com (wullie19 at ntlworld.com)
Date: Wed, 4 Mar 2009 22:07:41 +0000

Hi there 
I created an exe meterpreter/bind_tcp with lport 33333 and caused this exe to be started at start up. when I reboot the 
target machine I know it is loading my backdoor and a quick scan with nmap proves that its listening on port 33333.

The problem Im having is when I try to connect to it using. 

./msfcli exploit/windows/meterpreter/bind_tcp LPORT 33333 RHOST=TARGETIP E

it doesent connect to the listener. Can someone pls tell me where im going wrong
thanks

-rogue




Current thread: