Metasploit mailing list archives
ms08_067_netapi
From: metamaillist at gmail.com (metamaillist)
Date: Fri, 7 Nov 2008 13:11:19 -0700
It is interesting to note that after a reboot (a second time) that I have been able to exploit it 4 times consecutively within 30 seconds - 1 minute of each other. Thanks for the info! -----Original Message----- From: framework-bounces at spool.metasploit.com [mailto:framework-bounces at spool.metasploit.com] On Behalf Of H D Moore Sent: November-07-08 12:47 PM To: framework at spool.metasploit.com Subject: Re: [framework] ms08_067_netapi After the firs time you exploit the vulnerability, there is no gaurantee that the process state is sane. The use of ExitThread() means you can re-exploit the vulnerability *sometimes*, but its mostly there to prevent the service from crashing. In other words, dont count on being able to exploit the same system more than once, -HD On Friday 07 November 2008, metamaillist wrote:
I am testing this exploit with XP English SP3 in a VM. I successfully exploited it once, any attempts after this fail, even after a reboot. What exactly has changed and is there a way to repair it?
_______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- ms08_067_netapi alfonso caponi (Nov 05)
- ms08_067_netapi H D Moore (Nov 05)
- ms08_067_netapi Chris Green (Nov 06)
- <Possible follow-ups>
- ms08_067_netapi metamaillist (Nov 07)
- ms08_067_netapi H D Moore (Nov 07)
- ms08_067_netapi metamaillist (Nov 07)
- ms08_067_netapi H D Moore (Nov 07)
- ms08_067_netapi H D Moore (Nov 07)