Metasploit mailing list archives

Re: need help with ddwrt_cgibin_exec exploit


From: HD Moore <hdm () metasploit com>
Date: Mon, 12 Jul 2010 12:08:37 -0500

On 7/12/2010 12:07 PM, Binoy Dalal wrote:
i tried running ddwrt_cgibin_exec exploit against a remote server, i
filled in the rhost,lhost,lport=80 set the payload to
generic/shell_reverse_tcp
after putting in exploit a message saying "handler failed to bind to <my
IP>" is generated and then this is displayed
[*] Sending GET request with encoded command line...
[*] Giving the handler time to run...
[*] Exploit completed, but no session was created.


LPORT is the port on your machine to connect back, LHOST is the IP of
your machine. Make sure these are both accessible to the target.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: