Metasploit mailing list archives
Scanning machines
From: "Timm M.Schneider" <t.schneider () tms-itdienst at>
Date: Fri, 19 Feb 2010 11:49:27 +0100
Hello, i'm brand new at this so i need some help to get going. I scan my old Linux machine, there is openssh v1 running, so metasploit should tell me at least one open session but it didin't all sessions are "0 sessions". So what i have done wrong? Here the scanning results: [*] (1/37 [0 sessions]): Launching exploit/windows/ssh/freeftpd_key_exchange against 91.118.53.101:22... [*] (2/37 [0 sessions]): Launching exploit/windows/ssh/freesshd_key_exchange against 91.118.53.101:22... [*] (3/37 [0 sessions]): Launching exploit/aix/rpc_cmsd_opcode21 against 91.118.53.101:111... [*] (4/37 [0 sessions]): Launching exploit/aix/rpc_ttdbserverd_realpath against 91.118.53.101:111... [*] (5/37 [0 sessions]): Launching exploit/solaris/sunrpc/sadmind_adm_build_path against 91.118.53.101:111... [*] (6/37 [0 sessions]): Launching exploit/solaris/sunrpc/sadmind_exec against 91.118.53.101:111... [*] Job limit reached, waiting on modules to finish... [*] (7/37 [0 sessions]): Launching exploit/solaris/sunrpc/ypupdated_exec against 91.118.53.101:111... [*] (8/37 [0 sessions]): Launching exploit/windows/brightstor/mediasrv_sunrpc against 91.118.53.101:111... [*] (9/37 [0 sessions]): Launching exploit/linux/samba/lsa_transnames_heap against 91.118.53.101:139... [*] (10/37 [0 sessions]): Launching exploit/multi/samba/nttrans against 91.118.53.101:139... [*] (11/37 [0 sessions]): Launching exploit/multi/samba/usermap_script against 91.118.53.101:139... [*] (12/37 [0 sessions]): Launching exploit/netware/smb/lsass_cifs against 91.118.53.101:139... [*] (13/37 [0 sessions]): Launching exploit/osx/samba/lsa_transnames_heap against 91.118.53.101:139... [*] (14/37 [0 sessions]): Launching exploit/solaris/samba/trans2open against 91.118.53.101:139... [*] (15/37 [0 sessions]): Launching exploit/windows/brightstor/ca_arcserve_342 against 91.118.53.101:139... [*] (16/37 [0 sessions]): Launching exploit/windows/brightstor/etrust_itm_alert against 91.118.53.101:139... [*] (17/37 [0 sessions]): Launching exploit/windows/smb/ms03_049_netapi against 91.118.53.101:139... [*] (18/37 [0 sessions]): Launching exploit/windows/smb/ms04_011_lsass against 91.118.53.101:139... [*] (19/37 [0 sessions]): Launching exploit/windows/smb/ms04_031_netdde against 91.118.53.101:139... [*] (20/37 [0 sessions]): Launching exploit/windows/smb/ms05_039_pnp against 91.118.53.101:139... [*] (21/37 [0 sessions]): Launching exploit/windows/smb/ms06_040_netapi against 91.118.53.101:139... [*] (22/37 [0 sessions]): Launching exploit/windows/smb/ms06_066_nwapi against 91.118.53.101:139... [*] (23/37 [0 sessions]): Launching exploit/windows/smb/ms06_066_nwwks against 91.118.53.101:139... [*] (24/37 [0 sessions]): Launching exploit/windows/smb/ms06_070_wkssvc against 91.118.53.101:139... [*] (25/37 [0 sessions]): Launching exploit/windows/smb/ms08_067_netapi against 91.118.53.101:139... [*] (26/37 [0 sessions]): Launching exploit/windows/smb/msdns_zonename against 91.118.53.101:139... [*] (27/37 [0 sessions]): Launching exploit/windows/smb/netidentity_xtierrpcpipe against 91.118.53.101:139... [*] (28/37 [0 sessions]): Launching exploit/windows/smb/psexec against 91.118.53.101:139... [*] (29/37 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 91.118.53.101:139... [*] (30/37 [0 sessions]): Launching exploit/windows/misc/windows_rsh against 91.118.53.101:514... [*] (31/37 [0 sessions]): Launching exploit/hpux/lpd/cleanup_exec against 91.118.53.101:515... [*] (32/37 [0 sessions]): Launching exploit/irix/lpd/tagprinter_exec against 91.118.53.101:515... [*] (33/37 [0 sessions]): Launching exploit/linux/misc/lprng_format_string against 91.118.53.101:515... [*] (34/37 [0 sessions]): Launching exploit/solaris/lpd/sendmail_exec against 91.118.53.101:515... [*] (35/37 [0 sessions]): Launching exploit/windows/lpd/hummingbird_exceed against 91.118.53.101:515... [*] (36/37 [0 sessions]): Launching exploit/windows/lpd/niprint against 91.118.53.101:515... [*] (37/37 [0 sessions]): Launching exploit/windows/lpd/saplpd against 91.118.53.101:515... [*] (37/37 [0 sessions]): Waiting on 3 launched modules to finish execution... [*] The autopwn command has completed with 0 sessions Thx Timm ------------------------------------- TMS IT-DIENST Hinterstadt 2 4840 Vöcklabruck T: +43(0)720/ 501 078 (Per ENUM kostenlos erreichbar) +49(0)89/ 721010-77792 M: +43(0)664/ 479 79 25 F: +43(0)720/ 501 078-57
-- This message has been scanned by Kaspersky Anti-Virus. For more information about data security please visit http://www.kaspersky.com and http://www.viruslist.com
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Scanning machines Timm M.Schneider (Feb 19)
- Re: Scanning machines HD Moore (Feb 19)
- Re: Scanning machines Timm M.Schneider (Feb 19)
- windows/fileformat/adobe_pdf_embedded_exe no more working Thomas Werth (Feb 22)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Joshua J. Drake (Feb 23)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Tedi Heriyanto (Feb 23)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working One Time (Feb 23)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Joshua J. Drake (Mar 02)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Thomas Werth (Mar 02)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Thomas Werth (Mar 02)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Jonathan Cran (Mar 02)
- Re: windows/fileformat/adobe_pdf_embedded_exe no more working Joshua J. Drake (Feb 23)
- Re: Scanning machines HD Moore (Feb 19)