Metasploit mailing list archives

Exploit msrpc_dcom_ms03_026


From: thegnome at nmrc.org (Simple Nomad)
Date: Thu, 2 Mar 2006 00:26:25 -0600

On Thursday 02 March 2006 00:15, Penetrate Penetrate wrote:
Hi guys,
Am trying to use msrpc_dcom_ms03_026 exploit against a win2003 server SP1
which has administrator password set and all other settings are default.
Am using win32_reverse payload.
Am unable to get revese command shell back to my system.

Am using RPORT 135 and LPORT 80
when i set all options and fire Exploit command following messages are
shown.
----------------------------------------------------------------
[*] Starting Reverse Handler
[*] Splitting RPC request into 7 packets
[*] Exiting Reverse Handler
--------------------------------------------------------------

Any ideas why its happening?

Yes. Read the MS03-026 bulletin. Windows 2003 Gold is impacted, with SP1 it is 
patched against the vulnerability.

-- 
# Simple Nomad, C?ISSP  --  thegnome at nmrc.org        #
# C1B1 E749 25DF 867C 36D4  1E14 247A A4BD 6838 F11D #
# http://www.nmrc.org/~thegnome/                     #
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060302/aa92f552/attachment.pgp>


Current thread: