[prev in list] [next in list] [prev in thread] [next in thread]
List: metasploit-framework
Subject: Re: [framework] Backtrack 5r1 Metasploit opens two identical sessions
From: HD Moore <hdm () metasploit ! com>
Date: 2012-01-13 17:38:14
Message-ID: 4F106C06.6080305 () metasploit ! com
[Download RAW message or body]
On 1/13/2012 3:25 AM, Jonny Tobiassen wrote:
> Hello,
>
> When using BT5r1 metasploit always open two sessions like included example.
> Msf is version 4.2.0-dev.
>
> sf exploit(handler) >
> [*] Started reverse handler on 192.168.2.112:8081
> [*] Starting the payload handler...
> [*] Sending stage (752128 bytes) to 192.168.2.105
> [*] Meterpreter session 1 opened (192.168.2.112:443 ->
> 192.168.2.105:63141) at 2012-01-13 09:15:38 +0100
> [*] Sending stage (752128 bytes) to 192.168.2.105
> [*] Meterpreter session 2 opened (192.168.2.112:443 ->
> 192.168.2.105:63183) at 2012-01-13 09:15:43 +0100
Don't click the EXE twice?
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic