Metasploit mailing list archives
Finding Shell.
From: arcangel at phreaker.net (Arcangel)
Date: Mon, 4 Oct 2004 14:57:33 -0300
Hi list: I recently started using Metasploit Framework. I have a problem exploiting the "servu_mdtm_overflow". I set up a temporary Serv-U Ftp server 5.0.0.0 (in my PC) to test this vulnerability. When I tried to explote It seems that it works, but there is no shell at all. Something similar happened when I tried with another exploit. this is the banner: msf servu_mdtm_overflow(win32_bind) > exploit [*] Starting Bind Handler. [*] REMOTE> 220 ftp Server Ready... [*] REMOTE> 331 User name okay, need password. [*] REMOTE> 230 User logged in, proceed. [*] REMOTE> 227 Entering Passive Mode (127.0.0.1, 14,39) [*] Trying to explot target ServU 5.0.0.0 ServUDaemon.exe [*] Got Connection from 127.0.0.1:4444 [*] Exiting Handler. msf servu_mdtm_overflow(win32_bind) > where is the shell?? I also tried whit my Internet IP (not local 127.0....) but nothing. I have no Firewall. Thanks, Arc.
Current thread:
- Finding Shell. Arcangel (Oct 04)