Metasploit mailing list archives

Exploit msrpc_dcom_ms03_026


From: penetratek at gmail.com (Penetrate Penetrate)
Date: Thu, 2 Mar 2006 11:45:43 +0530

Hi guys,
Am trying to use msrpc_dcom_ms03_026 exploit against a win2003 server SP1
which has administrator password set and all other settings are default.
Am using win32_reverse payload.
Am unable to get revese command shell back to my system.

Am using RPORT 135 and LPORT 80
when i set all options and fire Exploit command following messages are
shown.
----------------------------------------------------------------
[*] Starting Reverse Handler
[*] Splitting RPC request into 7 packets
[*] Exiting Reverse Handler
--------------------------------------------------------------

Any ideas why its happening?


Regards
Penetrate
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060302/6ca56fb7/attachment.htm>


Current thread: