Metasploit mailing list archives
msfpayload backdoor
From: wullie19 at ntlworld.com (wullie19 at ntlworld.com)
Date: Wed, 4 Mar 2009 22:07:41 +0000
Hi there I created an exe meterpreter/bind_tcp with lport 33333 and caused this exe to be started at start up. when I reboot the target machine I know it is loading my backdoor and a quick scan with nmap proves that its listening on port 33333. The problem Im having is when I try to connect to it using. ./msfcli exploit/windows/meterpreter/bind_tcp LPORT 33333 RHOST=TARGETIP E it doesent connect to the listener. Can someone pls tell me where im going wrong thanks -rogue
Current thread:
- msfpayload backdoor wullie19 at ntlworld.com (Mar 04)
- msfpayload backdoor H D Moore (Mar 04)
- msfpayload backdoor Florian Roth (Mar 04)