Metasploit mailing list archives

Problem using Metasploit 3.1


From: pugliares.giuseppe at gmail.com (giuseppe pugliares)
Date: Wed, 2 Jul 2008 12:19:01 +0200

Hello, i have a problem that can't resolve using Metasploit.
I use the ms03_007_ntdll_webdav module and the  windows/shell/reverse_tcp
payloads.
After i have set all required variables i launche the exploit and this the
result:

msf exploit(ms03_007_ntdll_webdav) > exploit
[*] Started bind handler
[*] Trying return address 0x004e004f...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00420041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00430041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00c10041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00c30041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00c90041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00ca0041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00cb0041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00cc0041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00cd0041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00ce0041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00cf0041...
[*] Checking if IIS is back up after a failed attempt...
[*] Trying return address 0x00d00041...
[*] Checking if IIS is back up after a failed attempt...
msf exploit(ms03_007_ntdll_webdav) >

Why don't work?

Please help me.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20080702/1ed3ac9a/attachment.htm>


Current thread: