Metasploit mailing list archives

Connect to a remote windows host with valid credentials (no exploit)


From: nicolasfr at gmail.com (Nicolas FR)
Date: Fri, 1 Jun 2007 16:50:23 +0200

Follow-up to my own email:

- the met_bkdoor.exe created under linux works. I guess it does not work
under windows because of the terminal not being able to handle correctly
binary streams

- Kaspersky 6.0 detects the payload and blocks the .exe when the exploit is
launched (warning about "Buffer Overflow"); Kaspersky does a good job on
this, I am positively surprised.


Nicolas.

On 6/1/07, Nicolas FR <nicolasfr at gmail.com> wrote:

Thanks (and also thanks to the persons who replied to me directly).

I was thinking about psexec but was missing the way to export the payload
as an .exe. As noted in one answer I received I tried to follow
Ramakrishna Nyayapathi's email on this list from May 10th. But all I get
under windows when generating the .exe (ruby msfpayload
windows/meterpreter/bind_tcp LPORT=4444 EXITFUNC=thread X > met_bkdoor.exe)
is : "this program cannot be run in DOS mode."

I'll try to generate the .exe under Linux maybe that will work better.

Nicolas.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070601/9037c62f/attachment.htm>


Current thread: