Metasploit mailing list archives
XCHANGE 2000
From: hdm at metasploit.com (H D Moore)
Date: Wed, 18 May 2005 03:05:37 -0500
There is no problem, the exploit is just not very reliable. Assuming you are attacking a vulnerable system (Exchange 2000 running on Windows 2000), try using the attached exploit module instead. -HD On Wednesday 18 May 2005 02:49, vajira ganepola wrote:
Hi, In XCHANGE exploit I happen to get everything right and finally I get the message starting reconnect sequence :OK What seems to be the problem here Thanks Vajira
-------------- next part -------------- A non-text attachment was scrubbed... Name: exchange2000_xexch50.pm Type: application/x-perl-module Size: 9225 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20050518/eecb4fbd/attachment.bin>
Current thread:
- XCHANGE 2000 vajira ganepola (May 18)
- XCHANGE 2000 H D Moore (May 18)
- meterpreter,still not reliable ? Hamid . K (May 18)
- meterpreter,still not reliable ? mmiller at hick.org (May 18)
- meterpreter,still not reliable ? Hamid . K (May 18)
- XCHANGE 2000 H D Moore (May 18)