Metasploit mailing list archives
New problem here.
From: professor0110 at gmail.com (Professor 0110)
Date: Sat, 18 Apr 2009 17:32:37 +1000
Hi Patrick, I'm using this exploit: windows/iis/ms01_033_idq I've set the remote port to: 80 with the vulnerable IIS web server. I'm using the following payload: windows/shell_bind_tcp With LPORT set to 4444. I run the exploit and this is the output: (note: I've edited the IP addresses out) sf exploit(ms01_033_idq) > exploit [*] Started bind handler [*] Command shell session 1 opened (192.168.x.x:38845 -> x.x.x.x:4444) [*] Trying target Windows 2000 Pro English SP0... [-] Exploit failed: undefined method `put' for nil:NilClass [*] Exploit completed, but no session was created. On Fri, Apr 17, 2009 at 2:37 PM, Patrick Webster <patrick at aushack.com>wrote:
Can you provide more information as to the module name and settings? -Patrick
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090418/9d3db373/attachment.htm>
Current thread:
- New problem here. Professor 0110 (Apr 16)
- Message not available
- New problem here. Professor 0110 (Apr 16)
- New problem here. go.hawaii at gmx.de (Apr 16)
- New problem here. Professor 0110 (Apr 16)
- Message not available
- New problem here. Patrick Webster (Apr 16)
- New problem here. Professor 0110 (Apr 18)
- New problem here. Bogdan (Apr 18)
- New problem here. Professor 0110 (Apr 18)
- New problem here. Patrick Webster (Apr 22)
- New problem here. Professor 0110 (Apr 18)