For the last few weeks i've been playing with metasploit ...

Ive had fun hacking an old server using the old net_api overflow on xp sp 2

I just read the metasploit blog about the new adobe_libtiff exploit

i used the payload

windows/meterpreter/reverse_tcp

(is this right ?)

I have the PDF on the target machine it works A ok and connects back to my machine on xxx.xxx.xxx.3:1133 my question is ....

how do i go from a tcp connection to either a meterpreter session or vncinject using the command line in ruby ?

i've tried:

connect xxx.xxx.xxx.4:1133 ... it connects but then does nothing ?

^^^ do i need to run this as a bg session/job ?


any suggestions please

& please dont flame me