Metasploit mailing list archives

reverse TCP stager payload


From: black.gal007 at gmail.com (black gal)
Date: Tue, 11 Sep 2007 12:26:29 +0530

Hi All

This time i tried same exploit "ms06_001_wmf_setabortproc" with different
payload  Windows Executable Download and Execute, Reverse TCP Stager on
unpatched windows XP home edition. As a result it openend wmf file on
machine..but i m not able to find out if the exploit worked or not??
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070911/87059801/attachment.htm>


Current thread: