Metasploit mailing list archives
Backtrack 5r1 Metasploit opens two identical sessions
From: Jonny Tobiassen <jonny.tobiassen () hikt no>
Date: Fri, 13 Jan 2012 09:25:34 +0100
Hello, When using BT5r1 metasploit always open two sessions like included example. Msf is version 4.2.0-dev. sf exploit(handler) > [*] Started reverse handler on 192.168.2.112:8081 [*] Starting the payload handler... [*] Sending stage (752128 bytes) to 192.168.2.105 [*] Meterpreter session 1 opened (192.168.2.112:443 -> 192.168.2.105:63141) at 2012-01-13 09:15:38 +0100 [*] Sending stage (752128 bytes) to 192.168.2.105 [*] Meterpreter session 2 opened (192.168.2.112:443 -> 192.168.2.105:63183) at 2012-01-13 09:15:43 +0100 Anyoneelse seens this or know how to fix it? best regards, Jonny
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Backtrack 5r1 Metasploit opens two identical sessions Jonny Tobiassen (Jan 13)
- Re: Backtrack 5r1 Metasploit opens two identical sessions HD Moore (Jan 13)
- Ad: Re: Backtrack 5r1 Metasploit opens two identical sessions Jonny Tobiassen (Jan 16)
- Re: Backtrack 5r1 Metasploit opens two identical sessions HD Moore (Jan 13)