Metasploit mailing list archives
win32_adduser
From: hdm at metasploit.com (H D Moore)
Date: Fri, 13 Aug 2004 13:11:42 -0500
A fix is available via the online update system (msfupdate -u). If you prefer to install the patch manually, copy the attached file to: $BASE/lib/Msf/PayloadComponents/NoConnection.pm -HD On Friday 13 August 2004 12:46, Albano Jo?o Baeta Formiga wrote:
Hi, I'm sending this mail because of one little payload "win32_adduser", in the version 2.1 it was available in the exploit of MSSQL and it works very well but now it is not available. Why? We exists in the console but I can't aggregate to an exploit. Regards, Jo?o
-------------- next part -------------- A non-text attachment was scrubbed... Name: NoConnection.pm Type: application/x-perl-module Size: 319 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20040813/f2e69443/attachment.bin>
Current thread:
- win32_adduser Albano João Baeta Formiga (Aug 13)
- win32_adduser H D Moore (Aug 13)
- win32_adduser H D Moore (Aug 13)
- <Possible follow-ups>
- win32_adduser Dan Duplito (Aug 15)