One of the metasploit payloads (#4) is called Windows Bind Shell and the description says that it will "Execute payload and create an accepting port on remote system." but in practice how does it work? I tried executing it against a windows XP VM and when I ran the exploit nothing happened, I scanned the machine and there were no new ports open. Does anybody know how to put this exploit into practice?
Thanks, any help appreciated!