Metasploit mailing list archives
Exploit msrpc_dcom_ms03_026
From: penetratek at gmail.com (Penetrate Penetrate)
Date: Thu, 2 Mar 2006 11:45:43 +0530
Hi guys, Am trying to use msrpc_dcom_ms03_026 exploit against a win2003 server SP1 which has administrator password set and all other settings are default. Am using win32_reverse payload. Am unable to get revese command shell back to my system. Am using RPORT 135 and LPORT 80 when i set all options and fire Exploit command following messages are shown. ---------------------------------------------------------------- [*] Starting Reverse Handler [*] Splitting RPC request into 7 packets [*] Exiting Reverse Handler -------------------------------------------------------------- Any ideas why its happening? Regards Penetrate -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060302/6ca56fb7/attachment.htm>
Current thread:
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Simple Nomad (Mar 01)