Metasploit mailing list archives

Test failed on sploit of the Microsoft DNS RPC vulnerability


From: rhyskidd at gmail.com (Rhys Kidd)
Date: Sun, 15 Apr 2007 16:44:11 +0800

. Solo wrote:

      =[ msf v3.0
+ -- --=[ 185 exploits - 104 payloads
+ -- --=[ 17 encoders - 5 nops
      =[ 30 aux

The MS DNS Server RPC exploit only works in the development (msf
3.1-dev) release at the moment, as there are some additions to the
DCERPC mixins which allow you to remotely discover the correct TCP port
to bind to without having to resort to a nmap scan of the target.

HD Moore has said it will be included in the 3.0 release once Windows
2003 support has been finalised.

-Rhys



Current thread: