Metasploit mailing list archives
Finding Shell. more information.
From: arcangel at phreaker.net (Arcangel)
Date: Mon, 4 Oct 2004 20:52:07 -0300
I dont know if this is important but as it says in the documentation the Serv-U ftp Server dies when I run the exploit. I have Win XP SP2. bye. Arc.
Hi list: I recently started using Metasploit Framework. I have a problem exploiting the "servu_mdtm_overflow". I set up a temporary Serv-U Ftp server 5.0.0.0 (in my PC) to test this vulnerability. When I tried to explote It seems that it works, but there is no shell at all. Something similar happened when I tried with another exploit. this is the banner: msf servu_mdtm_overflow(win32_bind) > exploit [*] Starting Bind Handler. [*] REMOTE> 220 ftp Server Ready... [*] REMOTE> 331 User name okay, need password. [*] REMOTE> 230 User logged in, proceed. [*] REMOTE> 227 Entering Passive Mode (127.0.0.1, 14,39) [*] Trying to explot target ServU 5.0.0.0 ServUDaemon.exe [*] Got Connection from 127.0.0.1:4444 [*] Exiting Handler. msf servu_mdtm_overflow(win32_bind) > where is the shell?? I also tried whit my Internet IP (not local 127.0....) but nothing. I have no Firewall. Thanks, Arc.
Current thread:
- Finding Shell. more information. Arcangel (Oct 04)
- Finding Shell. more information. H D Moore (Oct 04)
- Finding Shell. more information. H D Moore (Oct 04)
- <Possible follow-ups>
- Finding Shell. more information. ninjatools at hush.com (Oct 04)
- Finding Shell. more information. Arcangel (Oct 04)
- Finding Shell. more information. ninjatools at hush.com (Oct 04)
- Finding Shell. more information. H D Moore (Oct 04)