Metasploit mailing list archives
Re: what cause this error??
From: hdm at metasploit.com (H D Moore)
Date: Sun, 7 May 2006 10:07:14 -0500
Hello, Session request failed just means that the exploit was not able to login to the remote SMB service. Windows 2003 SP1 is not vulnerable to this exploit anyways. -HD On Sunday 07 May 2006 04:41, net spy wrote:
HI how are you all (member of metasploit list).Im having a problem using bind shell payload with lsass.exe overflow exploit. i use lsass exploit and set payload to win32_bind.and set the remote port to 1030 where the service is running on remote.and my local port set to default 4444.Im using windows 2003 with sp1.Im testing my friendz website.The error i got is Session request failed *SMBSERVER.exing bind handler.any help would be helpful for me it will improve my pentest experience. Regards Net_Spy Send instant messages to your online friends http://uk.messenger.yahoo.com
Current thread:
- what cause this error?? net spy (May 07)
- Re: what cause this error?? H D Moore (May 07)
- Re: what cause this error?? net spy (May 08)
- Re: what cause this error?? Rhys Kidd (May 08)
- Re: what cause this error?? net spy (May 12)
- Re: what cause this error?? AgentSmith15 (May 12)
- Re: what cause this error?? H D Moore (May 12)
- Re: what cause this error?? net spy (May 08)
- Re: what cause this error?? H D Moore (May 07)