Metasploit mailing list archives
Re: attacking against XP-SP2
From: gargpriyank at gmail.com (priyank garg)
Date: Sun, 10 Jul 2005 16:23:16 +0530
i tried a large no. of targets with XP-SP2 but was unable to exploit it with any of the payloads available.DCOM and LSASS are not working. Please tell me is it possible to exploit an XP-SP2. On 7/8/05, Charles Hamby <fixer at gci.net> wrote:
Do you know which type of firewall? Some of them don't do any outbound filtering, in which case doing a reverse shell shouldn't present a problem. The fact that there is a firewall there yet you can still see SMB makes me wonder if the firewall has been misconfigured. Are you scanning from a LAN environment (or the same subnet)? That would explain it. -cdh vajira ganepola wrote:Hi, When scannining against XP service pack2, firewall enabled machine, it indicates its ports are closed exept for very few ( ex. SMB-445 ) Therefore deploying win32_bind payloads against XP-SP2 wouldnt work. I wish to know whether I will be able to exploit XP-SP2 with win32_reversebind payloads. OR would it be not possible at all, Since XP-SP2 doesnt support raw sockets. Thanks Vajira
Current thread:
- attacking against XP-SP2 vajira ganepola (Jul 07)
- attacking against XP-SP2 Charles Hamby (Jul 07)
- Re: attacking against XP-SP2 priyank garg (Jul 10)
- Re: attacking against XP-SP2 H D Moore (Jul 10)
- Re: attacking against XP-SP2 priyank garg (Jul 10)
- attacking against XP-SP2 Charles Hamby (Jul 07)