Metasploit mailing list archives

Finding Shell.


From: arcangel at phreaker.net (Arcangel)
Date: Mon, 4 Oct 2004 14:57:33 -0300

Hi list:

        I recently started using Metasploit Framework. I have a problem
exploiting the "servu_mdtm_overflow". I set up a temporary Serv-U Ftp server
5.0.0.0 (in my PC) to test this vulnerability. When I tried to explote It
seems that it works, but there is no shell at all. Something similar
happened when I tried with another exploit.

this is the banner:

msf servu_mdtm_overflow(win32_bind) > exploit
[*] Starting Bind Handler.
[*] REMOTE> 220 ftp Server Ready...
[*] REMOTE> 331 User name okay, need password.
[*] REMOTE> 230 User logged in, proceed.
[*] REMOTE> 227 Entering Passive Mode (127.0.0.1, 14,39)
[*] Trying to explot target ServU 5.0.0.0 ServUDaemon.exe
[*] Got Connection from 127.0.0.1:4444

[*] Exiting Handler.

msf servu_mdtm_overflow(win32_bind) >

where is the shell??

I also tried whit my Internet IP (not local 127.0....)
but nothing.
I have no Firewall.
Thanks,
Arc.




Current thread: