Results 1 to 7 of 7

Thread: meterpreter console in metasploit

  1. #1
    Just burned his ISO
    Join Date
    Apr 2010
    Posts
    4

    Default meterpreter console in metasploit

    Hi fellows,
    I am a total begginer, so I followed a PDF document to get in action. I think I could invade older PC using the exploit/windows/browser/orbit_connecting to get in over 3389 port. I set payload to windows/meterpreter/bind_tcp and I get positive feddbacks from console so I think I am in my target.
    The server started
    The problem is I don't get any meterprete prompt (meterpreter>)

    <--------------------->

    that's the console

    msf exploit(orbit_connecting) > exploit[*] Exploit running as background job.
    [*] Using URL: http://0.0.0.0:8080/U8d8dLHnlLM[*] Started bind handler[*] Local IP: http://10.0.0.104:8080/U8d8dLHnlLM[*] Server started.
    msf exploit(orbit_connecting) >

  2. #2
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: meterpreter console in metasploit

    That exploit doesnt work the way you think it does - its a browser exploit, meaning you need to access it via a browser from the target machine.

    Id suggest you start off with Metasploit Unleashed until you get more acquainted with how Metasploit operates.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  3. #3
    Just burned his ISO
    Join Date
    Apr 2010
    Posts
    4

    Default Re: meterpreter console in metasploit

    Hi Lupin thank you for your reply,
    I will try Metasploit Unleashed for sure!

    but meanwhile I started the server allwright:

    msf exploit(orbit_connecting) > rexploit[*] Exploit running as background job.

    [-] Handler failed to bind to 10.0.0.101:4444[*] Started reverse handler on 0.0.0.0:4444 [*] Using URL: http://0.0.0.0:8080/TjuO8M[*] Local IP: http://10.0.0.104:8080/TjuO8M[*] Server started.

    After that I typed the Local IP in my browser bar and it gives me nothing, olny the server regists this:

    msf exploit(orbit_connecting) >[*] Sending Orbit Downloader Connecting Log Creation Buffer Overflow to 10.0.0.230:59992...

  4. #4
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: meterpreter console in metasploit

    Do you have the vulnerable software installed on the victim system?
    What Operating System and Service Pack are you running?
    What browser are you using?

    Here's a hint... that exploit requires specific versions of all of the things I mentioned above. Use the source... and maybe also learn how these type of exploits work.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  5. #5
    Just burned his ISO
    Join Date
    Apr 2010
    Posts
    4

    Default Re: meterpreter console in metasploit

    Hi Lupin,
    So I got this on show options

    msf exploit(orbit_connecting) > show options

    Module options:

    Name Current Setting Required Description
    ---- --------------- -------- -----------
    SRVHOST 0.0.0.0 yes The local host to listen on.
    SRVPORT 8080 yes The local port to listen on.
    SSL false no Negotiate SSL for incoming connections
    SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
    URIPATH test no The URI to use for this exploit (default is random)


    Payload options (windows/meterpreter/bind_tcp):

    Name Current Setting Required Description
    ---- --------------- -------- -----------
    EXITFUNC process yes Exit technique: seh, thread, process
    LPORT 3389 yes The listen port
    RHOST 10.0.0.101 no The target address


    Exploit target:

    Id Name
    -- ----
    0 Windows XP SP0-SP3 / IE 6.0 SP0-SP2


    in fact I am tunneling to a Debian flavored Linux trought a ssh session that Linux is on 10.0.0.104 address. My actual machine is a Apple os X on address 10.0.0.230 and I am trying to exploit a Windows XP machine on 10.0.0.101 address.
    When I do exploit command I got:

    msf exploit(orbit_connecting) > exploit[*] Exploit running as background job.
    [*] Started bind handler[*] Using URL: http://0.0.0.0:8080/test[*] Local IP: http://10.0.0.104:8080/test[*] Server started.[*] Sending stage (748544 bytes) to 10.0.0.101

    I put this http://10.0.0.104:8080/test in firefox browser on os X machine and I got this os metasploit console:

    msf exploit(orbit_connecting) >[*] Started bind handler[*] Sending Orbit Downloader Connecting Log Creation Buffer Overflow to 10.0.0.230:62815...
    msf exploit(orbit_connecting) >[*] Sending Orbit Downloader Connecting Log Creation Buffer Overflow to 10.0.0.230:63078...

    So It isn't connecting wright?

    I know it is a passive exploit so I must wait to remote machine stablish connection but it is on why I can get positive shell feedback?

    thank you

  6. #6
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: meterpreter console in metasploit

    Quote Originally Posted by Mrloft View Post
    I put this http://10.0.0.104:8080/test in firefox browser on os X machine and I got this os metasploit console
    No, the victim machine needs to visit that URL.

    And the victim machine needs to have a vulnerable bit of software installed and be of the correct OS version and patchlevel AND must have a particular browser version installed. I could have sworn I already mentioned that...

    Seriously, start off with Metasploit Unleashed, you are trying to run before you can walk here.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  7. #7
    Just burned his ISO
    Join Date
    Apr 2010
    Posts
    4

    Default Re: meterpreter console in metasploit

    Ok
    I am following MS unleashed wrigth now
    I just wanted get the process faster, but as everything in life. I needs pacience and time!

    thank you for your replies.

Similar Threads

  1. Building a meterpreter executable (Metasploit)
    By stove937 in forum OLD Newbie Area
    Replies: 6
    Last Post: 12-05-2009, 01:56 PM
  2. Metasploit meterpreter and soundrecorder.rb
    By Handsome-geek in forum OLD Pentesting
    Replies: 6
    Last Post: 11-24-2009, 03:16 AM
  3. How to redirect the Metasploit Console output to a file?
    By yellowxi in forum OLD Pentesting
    Replies: 2
    Last Post: 11-19-2009, 06:21 AM
  4. iphone and metasploit? lol meterpreter?
    By BigMac in forum OLD Newbie Area
    Replies: 3
    Last Post: 05-27-2009, 02:57 PM
  5. Metasploit 3: meterpreter error
    By 7327312 in forum OLD Newbie Area
    Replies: 1
    Last Post: 11-03-2008, 05:33 AM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •