Metasploit mailing list archives

some payload error at attack ipv6 host, can't make connection


From: gleader at gmail.com (gleader)
Date: Wed, 20 Aug 2008 06:59:34 +0800

I am research about ipv6 + exploit.
I learn metasploit. i know it support ipv6 but when I use it ,there some
question about it .
when i am use  ms03_026_dcom exploit to a test machine.Ipv4 is ok and can
test many times.
but ipv6 i can exploit but payload can't connection.

I only use adduser payload ,it is ok
but bind_tcp and reversed_tcp all is wrong .
please help me.

i see some payload code example:
payloads/windows/shell_reverse_tcp.rb

'Offsets' =>
                        {
                            'LPORT'    => [ 166, 'n'    ],
                            'LHOST'    => [ 160, 'ADDR' ],
                            'EXITFUNC' => [ 278, 'V'    ],
                        },

the LHOST 160-166 only 6 .  ipv6 address is 128
so perphaps there is some wrong to support ipv6.

sorry my english is poor.
please help me .
what I can do change it .
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20080820/5835a133/attachment.htm>


Current thread: