Metasploit mailing list archives
Exploit msrpc_dcom_ms03_026
From: thegnome at nmrc.org (Simple Nomad)
Date: Thu, 2 Mar 2006 00:26:25 -0600
On Thursday 02 March 2006 00:15, Penetrate Penetrate wrote:
Hi guys, Am trying to use msrpc_dcom_ms03_026 exploit against a win2003 server SP1 which has administrator password set and all other settings are default. Am using win32_reverse payload. Am unable to get revese command shell back to my system. Am using RPORT 135 and LPORT 80 when i set all options and fire Exploit command following messages are shown. ---------------------------------------------------------------- [*] Starting Reverse Handler [*] Splitting RPC request into 7 packets [*] Exiting Reverse Handler -------------------------------------------------------------- Any ideas why its happening?
Yes. Read the MS03-026 bulletin. Windows 2003 Gold is impacted, with SP1 it is patched against the vulnerability. -- # Simple Nomad, C?ISSP -- thegnome at nmrc.org # # C1B1 E749 25DF 867C 36D4 1E14 247A A4BD 6838 F11D # # http://www.nmrc.org/~thegnome/ # -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060302/aa92f552/attachment.pgp>
Current thread:
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 Penetrate Penetrate (Mar 01)
- Exploit msrpc_dcom_ms03_026 H D Moore (Mar 01)
- Exploit msrpc_dcom_ms03_026 Simple Nomad (Mar 01)