Results 1 to 2 of 2

Thread: Metasploit tcp connect ...

  1. #1
    Just burned his ISO
    Join Date
    Mar 2010
    Posts
    1

    Post Metasploit tcp connect ...

    For the last few weeks i've been playing with metasploit ...

    Ive had fun hacking an old server using the old net_api overflow on xp sp 2

    I just read the metasploit blog about the new adobe_libtiff exploit

    i used the payload

    windows/meterpreter/reverse_tcp

    (is this right ?)

    I have the PDF on the target machine it works A ok and connects back to my machine on xxx.xxx.xxx.3:1133 my question is ....

    how do i go from a tcp connection to either a meterpreter session or vncinject using the command line in ruby ?

    i've tried:

    connect xxx.xxx.xxx.4:1133 ... it connects but then does nothing ?

    ^^^ do i need to run this as a bg session/job ?


    any suggestions please

    & please dont flame me

  2. #2
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    19

    Default

    oops am confused..the payload uhave opted is the metpreter only rgt??? wht else are u asking for??

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •