Metasploit mailing list archives
some payload error at attack ipv6 host, can't make connection
From: gleader at gmail.com (gleader)
Date: Wed, 20 Aug 2008 06:59:34 +0800
I am research about ipv6 + exploit. I learn metasploit. i know it support ipv6 but when I use it ,there some question about it . when i am use ms03_026_dcom exploit to a test machine.Ipv4 is ok and can test many times. but ipv6 i can exploit but payload can't connection. I only use adduser payload ,it is ok but bind_tcp and reversed_tcp all is wrong . please help me. i see some payload code example: payloads/windows/shell_reverse_tcp.rb 'Offsets' => { 'LPORT' => [ 166, 'n' ], 'LHOST' => [ 160, 'ADDR' ], 'EXITFUNC' => [ 278, 'V' ], }, the LHOST 160-166 only 6 . ipv6 address is 128 so perphaps there is some wrong to support ipv6. sorry my english is poor. please help me . what I can do change it . -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20080820/5835a133/attachment.htm>
Current thread:
- some payload error at attack ipv6 host, can't make connection gleader (Aug 19)
- some payload error at attack ipv6 host, can't make connection H D Moore (Aug 19)