Metasploit mailing list archives

Finding Shell. more information.


From: arcangel at phreaker.net (Arcangel)
Date: Mon, 4 Oct 2004 20:52:07 -0300

I dont know if this is important but as it says in the documentation  the 
Serv-U ftp Server dies when I run the exploit. I have Win XP SP2.
bye.
Arc.
Hi list:

       I recently started using Metasploit Framework. I have a problem
exploiting the "servu_mdtm_overflow". I set up a temporary Serv-U Ftp 
server
5.0.0.0 (in my PC) to test this vulnerability. When I tried to explote It
seems that it works, but there is no shell at all. Something similar
happened when I tried with another exploit.

this is the banner:

msf servu_mdtm_overflow(win32_bind) > exploit
[*] Starting Bind Handler.
[*] REMOTE> 220 ftp Server Ready...
[*] REMOTE> 331 User name okay, need password.
[*] REMOTE> 230 User logged in, proceed.
[*] REMOTE> 227 Entering Passive Mode (127.0.0.1, 14,39)
[*] Trying to explot target ServU 5.0.0.0 ServUDaemon.exe
[*] Got Connection from 127.0.0.1:4444

[*] Exiting Handler.

msf servu_mdtm_overflow(win32_bind) >

where is the shell??

I also tried whit my Internet IP (not local 127.0....)
but nothing.
I have no Firewall.
Thanks,
Arc.





Current thread: