Metasploit mailing list archives

Problem with Apache Win32 Chunked Encoding


From: bluefoxy at tiscali.it (bluefoxy)
Date: Tue, 30 Oct 2007 11:07:29 +0100

Yes, I try with check functionality.
This is my output:

check
[*] Serer is probably not vulnerable:
[*] The target is not exploitable.

exploit
[*] Started bind handler
[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/2 ]
[-] Exploit failed: Connection reset by peer

msf exploit(apache_chunked) >


Rhys Kidd ha scritto:
Are you running the Check functionality against your target to 
determine the version/build information?
Which one is it?

By virtue of this, I will then be able to see which TARGET is being 
set, and the method of gaining code execution.

Rhys
------------------------------------------------------------------------

No virus found in this incoming message.
Checked by AVG Free Edition. 
Version: 7.5.503 / Virus Database: 269.15.12/1098 - Release Date: 29/10/2007 9.28
  




Current thread: