daxle Posted June 14, 2013 Share Posted June 14, 2013 One of the metasploit payloads (#4) is called Windows Bind Shell and the description says that it will "Execute payload and create an accepting port on remote system." but in practice how does it work? I tried executing it against a windows XP VM and when I ran the exploit nothing happened, I scanned the machine and there were no new ports open. Does anybody know how to put this exploit into practice? Thanks, any help appreciated! Quote Link to comment Share on other sites More sharing options...
digip Posted June 15, 2013 Share Posted June 15, 2013 (edited) See picture above, read description. Executing an exploit, does not mean it actually worked, or you would get a session on the other box to interact with. Edited June 15, 2013 by digip Quote Link to comment Share on other sites More sharing options...
digininja Posted June 16, 2013 Share Posted June 16, 2013 I recommend you go through these guides, they will tell you all you need to know. http://www.offensive-security.com/metasploit-unleashed/Main_Page http://www.securitytube.net/groups?operation=view&groupId=8 Quote Link to comment Share on other sites More sharing options...
joey-world Posted July 18, 2013 Share Posted July 18, 2013 That payload is to only open a port on the system you want to get in. You send that file to the Windows xp machine, in this case, and then you run it locally (inside of the windows xp machine) After that, scan the machine with nmap, you'll see that there will be a new port opened on the windows XP machine. That port will now be accepting a remote session from your metasploid, that you will have to manually activate. That's pretty much what it does. Best Regards Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.