Metasploit mailing list archives

Updated Microsoft DNS modules


From: msairam at intoto.com (M.P.Sairam)
Date: Tue, 22 May 2007 10:35:17 +0530

Is this work around updated into msf tree ? or its a temporary solution?

At 09:42 PM 4/21/2007, you wrote:

Le 20 avr. 07 ? 10:35, H D Moore a ?crit :

The latest MSDNS RPC module supports the French locale (set Locale to
French and use automatic target 0). I also added a SMB module that
exploits the vulnerability over a named pipe (port 445 or 139). The
SMB
module requires the SMBUSER/SMBPASS options to be set to a valid user
account, since the \DNSSERVER pipe is not accessible to anonymous
users.

Enjoy!

Thanks HD,

I just add other french targets (Win2000 and Win2003 SP0), but now
I've got a problem when I don't want the automatic target.

Not sure it's very useful but here's a workaround :

@@ -146,7 +146,7 @@
                                return
                        end
                else
-
+                       target = targets[ datastore['TARGET'] ]
                end


@+

Fab




Thanks,
    --
Sairam 



********************************************************************************
This email message (including any attachments) is for the sole use of the intended recipient(s) 
and may contain confidential, proprietary and privileged information. Any unauthorized review, 
use, disclosure or distribution is prohibited. If you are not the intended recipient, 
please immediately notify the sender by reply email and destroy all copies of the original message. 
Thank you.
 
Intoto Inc. 




Current thread: