Metasploit mailing list archives

Windows 2003 Server SP1


From: rhyskidd at gmail.com (Rhys Kidd)
Date: Sat, 12 Aug 2006 20:34:33 +0800

Omid,
 
1. Exploits are designed to address a particular vulnerability. If you are
after information on vulnerabilities in the Windows 2003 SP1 platform, I'd
suggest having a look at here
http://www.microsoft.com/technet/security/current.aspx
 
2. It's pretty clear you are trying to exploit machines which you are
unauthorised to test. This is illegal in most countries. Metasploit is not
about this. 
 
Generally most firewalls block ICMP requests, in addition to firewalling TCP
and UDP ports. If it doesn't respond to a ping (and there is definately a
host at that address) you've probably found a firewalled computer. Hence an
attempt against this computer will probably fail.
 
- R
 
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060812/09613948/attachment.htm>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060812/09613948/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGPexch.htm.asc
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060812/09613948/attachment.pgp>


Current thread: