Metasploit mailing list archives
Problem exploiting the MS DNS RPC Service (msdns_zonename)
From: hdm at metasploit.com (H D Moore)
Date: Thu, 7 Jun 2007 08:38:14 -0500
Either one works, the / determines whether the "single" or the "staged" version is used. windows/shell_reverse_tcp is a "single" with all the code in one buffer, while windows/shell/reverse_tcp sends the reverse connect code in the first stage, then downloads the shell stage at runtime. -HD On Thursday 07 June 2007 00:01, Patrick Webster wrote:
Also, don't you mean set PAYLOAD windows/shell/reverse_tcp?
Current thread:
- Problem exploiting the MS DNS RPC Service (msdns_zonename) Jason Thompson (Jun 06)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) M.P.Sairam (Jun 06)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) Patrick Webster (Jun 06)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) H D Moore (Jun 07)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) Jason Thompson (Jun 07)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) Fabrice MOURRON (Jun 07)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) Patrick Webster (Jun 06)
- Problem exploiting the MS DNS RPC Service (msdns_zonename) M.P.Sairam (Jun 06)