Metasploit mailing list archives

New problem here.


From: professor0110 at gmail.com (Professor 0110)
Date: Sat, 18 Apr 2009 19:26:46 +1000

No, I'm testing out this exploit on a remote server which belongs to a
friend of mine. He was kind enough to allow me to try to exploit his old IIS
5 web server.

On Sat, Apr 18, 2009 at 6:40 PM, Bogdan <bogdan at generalconsult.ro> wrote:

 Is there the IIS server running in a virtual machine?
I've tried various passive exploits against a vulnerable Windows XP SP2
running inside VMWare ESX 3.5.
Almost none of them worked.


----- Original Message -----
*From:* Professor 0110 <professor0110 at gmail.com>
*To:* Patrick Webster <patrick at aushack.com>
*Cc:* framework at spool.metasploit.com
*Sent:* Saturday, April 18, 2009 10:32 AM
*Subject:* Re: [framework] New problem here.

Hi Patrick,

I'm using this exploit: windows/iis/ms01_033_idq

I've set the remote port to: 80  with the vulnerable IIS web server.

I'm using the following payload: windows/shell_bind_tcp

With LPORT set to 4444.

I run the exploit and this is the output: (note: I've edited the IP
addresses out)

sf exploit(ms01_033_idq) > exploit
[*] Started bind handler
[*] Command shell session 1 opened (192.168.x.x:38845 -> x.x.x.x:4444)
[*] Trying target Windows 2000 Pro English SP0...
[-] Exploit failed: undefined method `put' for nil:NilClass
[*] Exploit completed, but no session was created.

On Fri, Apr 17, 2009 at 2:37 PM, Patrick Webster <patrick at aushack.com>wrote:

Can you provide more information as to the module name and settings?

-Patrick


 ------------------------------

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090418/2797b550/attachment.htm>


Current thread: