Metasploit mailing list archives

win32_adduser


From: hdm at metasploit.com (H D Moore)
Date: Fri, 13 Aug 2004 13:11:42 -0500

A fix is available via the online update system (msfupdate -u). If you 
prefer to install the patch manually, copy the attached file to:

$BASE/lib/Msf/PayloadComponents/NoConnection.pm

-HD

On Friday 13 August 2004 12:46, Albano Jo?o Baeta Formiga wrote:
Hi,



I'm sending this mail because of one little payload "win32_adduser", in
the version 2.1 it was available in the exploit of MSSQL and it works
very well but now it is not available. Why? We exists in the console
but I can't aggregate to an exploit.



Regards,





Jo?o
-------------- next part --------------
A non-text attachment was scrubbed...
Name: NoConnection.pm
Type: application/x-perl-module
Size: 319 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20040813/f2e69443/attachment.bin>


Current thread: