One of the metasploit payloads (#4) is called Windows Bind Shell and the description says that it will "Execute payload and create an accepting port on remote system." but in practice how does it work? I tried executing it against a windows XP VM and when I ran the exploit nothing happened, I scanned the machine and there were no new ports open. Does anybody know how to put this exploit into practice?
What is the payload Windows Bind Shell and how does it work?
in Security
Posted
One of the metasploit payloads (#4) is called Windows Bind Shell and the description says that it will "Execute payload and create an accepting port on remote system." but in practice how does it work? I tried executing it against a windows XP VM and when I ran the exploit nothing happened, I scanned the machine and there were no new ports open. Does anybody know how to put this exploit into practice?
Thanks, any help appreciated!