Metasploit mailing list archives

Queries on CABRIGHTSTOR exploit


From: jerome.athias at free.fr (Jerome Athias)
Date: Thu, 27 Oct 2005 09:41:53 +0200

Hi,

I never tested this one.
did you edit the exploit module?
You should check the "available space" information to see how many space
is available for a payload.
Then, read the author's comments, i think it was only tested on Win XP
SP1...
As Mr Miller said, maybe the address is not correct for your target...

Good luck
/JA

The vulnerable machine is on internet. But I also tried the CMD execution
payload which I feel should work in this case. And there isn't a bind
payload for this module. Any idea how can I create one?

I would appreciate some more pointers from experts.

 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5213 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20051027/81e68d77/attachment.bin>


Current thread: