Metasploit mailing list archives
Running exploits
From: hdm at metasploit.com (H D Moore)
Date: Thu, 3 Mar 2005 14:04:38 -0600
Hi, A handful of the exploits not only connect, but also require some form of response before they send the request that will trigger the vulnerability. Exploits like this (such as MSRPC, LSASS, etc) will require a responsive network service to really test, otherwise you will only see the initial negotiation requests. The UDP-based exploits do not require a connection (and most do not require a response). Take a look at the MSSQL Resolution Overflow and the ISS PAM Overflow exploit modules. Just curious, but are you trying to demonstrate the effectiveness of the firewall or learn more about the actual exploits? -HD On Thursday 03 March 2005 13:57, Peter Atanasovski wrote:
It seems that as a minimum, each exploit must at least create a connection to a targeted service, and then the exploit will be transmitted.
Current thread:
- Running exploits Peter Atanasovski (Mar 03)
- Running exploits H D Moore (Mar 03)
- Running exploits Peter Atanasovski (Mar 03)
- Running exploits H D Moore (Mar 03)