Metasploit mailing list archives
Windows 2003 Server SP1
From: rhyskidd at gmail.com (Rhys Kidd)
Date: Sat, 12 Aug 2006 20:34:33 +0800
Omid, 1. Exploits are designed to address a particular vulnerability. If you are after information on vulnerabilities in the Windows 2003 SP1 platform, I'd suggest having a look at here http://www.microsoft.com/technet/security/current.aspx 2. It's pretty clear you are trying to exploit machines which you are unauthorised to test. This is illegal in most countries. Metasploit is not about this. Generally most firewalls block ICMP requests, in addition to firewalling TCP and UDP ports. If it doesn't respond to a ping (and there is definately a host at that address) you've probably found a firewalled computer. Hence an attempt against this computer will probably fail. - R -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060812/09613948/attachment.htm> -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060812/09613948/attachment-0001.htm> -------------- next part -------------- A non-text attachment was scrubbed... Name: PGPexch.htm.asc Type: application/pgp-signature Size: 187 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060812/09613948/attachment.pgp>
Current thread:
- Windows 2003 Server SP1 Omid ... (Aug 12)
- Windows 2003 Server SP1 Rhys Kidd (Aug 12)
- Windows 2003 Server SP1 Nicolas RUFF (Aug 12)
- error in when updating via msfupdate j.asf (Aug 13)
- error in when updating via msfupdate j.asf (Aug 13)