Metasploit mailing list archives

Windows Server 2003 R2 (SP2) Target


From: hdm at metasploit.com (H D Moore)
Date: Tue, 4 Nov 2008 10:57:17 -0600

The 2003 SP1/SP2 bypass is senstive to any changes in ntdll.dll, 
shell32.dll, and ws2help.dll. What are the MD5s of these files on your 
machine? It could be that R2 ships with slightly different binaries, or a 
post-SP2 windows update changed the binary.


On Tuesday 04 November 2008, vibus at gmx.net wrote:
I've been unable to exploit my Windows 2003 server in using "Windows
2003 SP2 English (NX)". I even made a clean install in my VM with the
same results. I double checked the SP (2) and the language (english).





Current thread: