Metasploit mailing list archives
Re: Exploit not working (haZard0us)
From: "Scott McClellan" <Scott.McClellan () tn gov>
Date: Fri, 08 Jul 2011 14:21:14 -0500
My first guess would be that patches were applied to your VMs, which stopped the exploits from working. I typically work with my VMs set to host-only (in their own walled garden, without wider network access unless I need it). After searching, I found 4 matches on easyftp; one of which you mentioned. Have you tried the remaining three to see if they work? You might also try a different payload. Date: Fri, 08 Jul 2011 18:43:26 +0100 From: haZard0us <hazard0us.pt () gmail com> To: framework metasploit <framework () spool metasploit com> Subject: [framework] Exploit not working Message-ID: <4E1741BE.8040603 () gmail com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Hi all, It's my first contribution to this list so... Hello all :) I have a problem. Some time ago, using virtual machines and using the exploit/windows/ftp/easyftp_cwd_fixret (i think that this is the correct name) i was able to get a remote shell using the windows/shell/reverse_tcp payload. Now, using the same exploit/payload, using the same machines with the same network configuration, i can't do it anymore. It says that exploit was successful but no session was created. Any ideas? Thanks, haZ
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Re: Exploit not working (haZard0us) Scott McClellan (Jul 08)