Jump to content

What is the payload Windows Bind Shell and how does it work?


daxle
 Share

Recommended Posts

One of the metasploit payloads (#4) is called Windows Bind Shell and the description says that it will "Execute payload and create an accepting port on remote system." but in practice how does it work? I tried executing it against a windows XP VM and when I ran the exploit nothing happened, I scanned the machine and there were no new ports open. Does anybody know how to put this exploit into practice?

WmPNmPM.png

Thanks, any help appreciated!

Link to comment
Share on other sites

See picture above, read description. Executing an exploit, does not mean it actually worked, or you would get a session on the other box to interact with.

Edited by digip
Link to comment
Share on other sites

  • 1 month later...

That payload is to only open a port on the system you want to get in. You send that file to the Windows xp machine, in this case, and then you run it locally (inside of the windows xp machine) After that, scan the machine with nmap, you'll see that there will be a new port opened on the windows XP machine. That port will now be accepting a remote session from your metasploid, that you will have to manually activate.

That's pretty much what it does.

Best Regards

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...