Metasploit mailing list archives

Running exploits


From: hdm at metasploit.com (H D Moore)
Date: Thu, 3 Mar 2005 14:04:38 -0600

Hi,

A handful of the exploits not only connect, but also require some form of 
response before they send the request that will trigger the 
vulnerability. Exploits like this (such as MSRPC, LSASS, etc) will 
require a responsive network service to really test, otherwise you will 
only see the initial negotiation requests. The UDP-based exploits do not 
require a connection (and most do not require a response). Take a look at 
the MSSQL Resolution Overflow and the ISS PAM Overflow exploit modules. 
Just curious, but are you trying to demonstrate the effectiveness of the 
firewall or learn more about the actual exploits?

-HD

On Thursday 03 March 2005 13:57, Peter Atanasovski wrote:
It seems that as a minimum, each exploit must at least create a
connection to a targeted service, and then the exploit will be
transmitted.



Current thread: