Metasploit mailing list archives
Test failed on sploit of the Microsoft DNS RPC vulnerability
From: soloaway at gmail.com (. Solo)
Date: Sun, 15 Apr 2007 16:29:15 +0800
Hi List, I tested "Microsoft DNS RPC extractQuotedChar() Overflow" with framework3. I try both of AddUser or Bind shell, however, after filled the blank , the exploit console window does appeared and showed the following error message: =[ msf v3.0 + -- --=[ 185 exploits - 104 payloads + -- --=[ 17 encoders - 5 nops =[ 30 aux [*] Started bind handler [-] Exploit failed: wrong number of arguments (2 for 1) i am sure that I filled all of *require* blank. could you help me to check it? Thanks .Solo
Current thread:
- Test failed on sploit of the Microsoft DNS RPC vulnerability . Solo (Apr 15)
- Test failed on sploit of the Microsoft DNS RPC vulnerability H D Moore (Apr 15)
- Test failed on sploit of the Microsoft DNS RPC vulnerability Rhys Kidd (Apr 15)