Metasploit mailing list archives

Re: what cause this error??


From: hdm at metasploit.com (H D Moore)
Date: Sun, 7 May 2006 10:07:14 -0500

Hello,

Session request failed just means that the exploit was not able to login 
to the remote SMB service. Windows 2003 SP1 is not vulnerable to this 
exploit anyways.

-HD

On Sunday 07 May 2006 04:41, net spy wrote:
HI

   how are you all (member of metasploit list).Im having a problem
using bind shell payload with lsass.exe overflow exploit.

   i use lsass exploit and set payload to win32_bind.and set the 
remote port to 1030 where the service  is running on remote.and my 
local port set to default 4444.Im using windows 2003 with sp1.Im 
testing my friendz website.The  error i got is Session request  failed
*SMBSERVER.exing bind handler.any help would be helpful for me  it will
improve my pentest experience.

    Regards
    Net_Spy

Send instant messages to your online friends
http://uk.messenger.yahoo.com



Current thread: