Metasploit mailing list archives

New problem here.


From: bogdan at generalconsult.ro (Bogdan)
Date: Sat, 18 Apr 2009 11:40:02 +0300

Is there the IIS server running in a virtual machine?
I've tried various passive exploits against a vulnerable Windows XP SP2 running inside VMWare ESX 3.5.
Almost none of them worked.

  ----- Original Message ----- 
  From: Professor 0110 
  To: Patrick Webster 
  Cc: framework at spool.metasploit.com 
  Sent: Saturday, April 18, 2009 10:32 AM
  Subject: Re: [framework] New problem here.


  Hi Patrick, 

  I'm using this exploit: windows/iis/ms01_033_idq

  I've set the remote port to: 80  with the vulnerable IIS web server.

  I'm using the following payload: windows/shell_bind_tcp

  With LPORT set to 4444. 

  I run the exploit and this is the output: (note: I've edited the IP addresses out)

  sf exploit(ms01_033_idq) > exploit
  [*] Started bind handler
  [*] Command shell session 1 opened (192.168.x.x:38845 -> x.x.x.x:4444)
  [*] Trying target Windows 2000 Pro English SP0...
  [-] Exploit failed: undefined method `put' for nil:NilClass
  [*] Exploit completed, but no session was created.


  On Fri, Apr 17, 2009 at 2:37 PM, Patrick Webster <patrick at aushack.com> wrote:

    Can you provide more information as to the module name and settings?

    -Patrick





------------------------------------------------------------------------------


  _______________________________________________
  https://mail.metasploit.com/mailman/listinfo/framework
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090418/f3b19b5f/attachment.htm>


Current thread: