Metasploit mailing list archives
Exploit msrpc_dcom_ms03_026
From: penetratek at gmail.com (Penetrate Penetrate)
Date: Thu, 2 Mar 2006 11:54:27 +0530
Oh, Thanks for the info pal :) Any other exploit is there which works on win2003 sp1 ? Regards Penetrate On 3/2/06, H D Moore <hdm at metasploit.com> wrote:
Windows 2003 SP1 is not vulnerable to this flaw. -HD On Thursday 02 March 2006 00:15, Penetrate Penetrate wrote:Am trying to use msrpc_dcom_ms03_026 exploit against a win2003 server SP1 which has administrator password set and all other settings are default. Am using win32_reverse payload. Am unable to get revese command shell back to my system.
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060302/b6cfc161/attachment.htm>
Current thread:
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Simple Nomad (Mar 01)