Metasploit mailing list archives

[framework]No check has been implemented for this module!!!


From: hdm at metasploit.com (H D Moore)
Date: Fri, 20 Aug 2004 01:34:39 -0500

On Friday 20 August 2004 01:02, Cliff wrote:
    I use metasploit in Cygwin and encountered two problem.
    [*] No check has been implemented for this module

This is expected behavior, we do not implement vulnerability tests in 
every single exploit module. In this case, the bug is in an IDS product, 
there is no non-intrusive way to test for this flaw.

    Secondly,after I launch the exploit to unpatched BlackICE,the
return is displayed as following: msf blackice_pam_icq(win32_reverse) >
   [*] Starting Reverse Handler.
   [*] Sleeping (giving exception handle time to recover).
   [*] Exiting Reverse Handler.

That is normal output. It sent a single exploit request, was not able to 
connect to the payload, and exited. Either the exploit failed, the target 
was not vulnerable, or something else went wrong. With the BlackICE/ISS 
exploit, set the TARGET to 0 to run in brute force mode. After each 
attempt, the service will restart itself and it will try again. You may 
need to tweak the timeout settings based on your network (show advanced 
to see the timeout options for this exploit).

-HD



Current thread: