[prev in list] [next in list] [prev in thread] [next in thread] 

List:       metasploit-framework
Subject:    Re: [framework] Backtrack 5r1 Metasploit opens two identical sessions
From:       HD Moore <hdm () metasploit ! com>
Date:       2012-01-13 17:38:14
Message-ID: 4F106C06.6080305 () metasploit ! com
[Download RAW message or body]

On 1/13/2012 3:25 AM, Jonny Tobiassen wrote:
> Hello,
> 
> When using BT5r1 metasploit always open two sessions like included example.
> Msf is version 4.2.0-dev.
> 
> sf  exploit(handler) >
> [*] Started reverse handler on 192.168.2.112:8081
> [*] Starting the payload handler...
> [*] Sending stage (752128 bytes) to 192.168.2.105
> [*] Meterpreter session 1 opened (192.168.2.112:443 ->
> 192.168.2.105:63141) at 2012-01-13 09:15:38 +0100
> [*] Sending stage (752128 bytes) to 192.168.2.105
> [*] Meterpreter session 2 opened (192.168.2.112:443 ->
> 192.168.2.105:63183) at 2012-01-13 09:15:43 +0100

Don't click the EXE twice?
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic