Metasploit mailing list archives
Windows Server 2003 R2 (SP2) Target
From: hdm at metasploit.com (H D Moore)
Date: Tue, 4 Nov 2008 10:57:17 -0600
The 2003 SP1/SP2 bypass is senstive to any changes in ntdll.dll, shell32.dll, and ws2help.dll. What are the MD5s of these files on your machine? It could be that R2 ships with slightly different binaries, or a post-SP2 windows update changed the binary. On Tuesday 04 November 2008, vibus at gmx.net wrote:
I've been unable to exploit my Windows 2003 server in using "Windows 2003 SP2 English (NX)". I even made a clean install in my VM with the same results. I double checked the SP (2) and the language (english).
Current thread:
- Windows Server 2003 R2 (SP2) Target vibus at gmx.net (Nov 04)
- DDOS on Site Wright, Gareth (Nov 04)
- Windows Server 2003 R2 (SP2) Target H D Moore (Nov 04)
- <Possible follow-ups>
- Windows Server 2003 R2 (SP2) Target metafan at intern0t.net (Nov 04)