Metasploit mailing list archives

XCHANGE 2000


From: hdm at metasploit.com (H D Moore)
Date: Wed, 18 May 2005 03:05:37 -0500

There is no problem, the exploit is just not very reliable. Assuming you 
are attacking a vulnerable system (Exchange 2000 running on Windows 
2000), try using the attached exploit module instead.

-HD

On Wednesday 18 May 2005 02:49, vajira ganepola wrote:
Hi,

In XCHANGE  exploit I happen to get everything right and finally I get
the message starting reconnect sequence :OK


What seems to be the problem here


Thanks

Vajira
-------------- next part --------------
A non-text attachment was scrubbed...
Name: exchange2000_xexch50.pm
Type: application/x-perl-module
Size: 9225 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20050518/eecb4fbd/attachment.bin>


Current thread: