Metasploit mailing list archives

Win32_Bind_Stg_Upexec Payload


From: ilcjvm at hotmail.com (jesus saves)
Date: Wed, 11 May 2005 10:10:18 -0400

Hi,

I am testing the above payload within my test network. I am exploiting a W2K 
machine using the rpc dcom exploit module. For testing purposes, I am 
attempting to upload and execute "notepad.exe" on my target machine. After 
executing the exploit module, I notice on my target machine that 
"metasploit.exe" is listed in the running processes, but not notepad.exe. 
With this particular payload, are the executable file names  renamed to 
"metasploit.exe" ?

Thanks in advance!!!

_________________________________________________________________
Don?t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/




Current thread: