Metasploit mailing list archives

query on exploit/windows/browser/apple_quicktime_rtsp


From: nkanaskar at hotmail.com (Nitin Kanaskar)
Date: Sun, 8 Feb 2009 20:57:01 -0600



hello list

I have apple quicktime player 7.1.3 installed on my xp box.
and BT3 with metasploit running on the same as a vmware virtual machine.
I am trying to run  exploit/windows/browser/apple_quicktime_rtsp
My options for this exploit are 

SRVHOST=127.0.0.1
SRVPORT=4444

PAYLOAD= generic/shell_bind_tcp

when i run the exploit, i get msg -

[*] Using URL http://127.0.0.1:4444/CFRhDQoemBCJ
[*] Server started.

I see a job with the name windows/browser/apple_quicktime_rtsp
in the Jobs tab of msfgui, nothing in sessions tab.
I am not able to understand if the exploit ran/failed.

Do i need to run quick time from inside my browser on xp?

Any help will be highly appreciated.

Thanks 
Nitin
 
_________________________________________________________________
Windows Live?: E-mail. Chat. Share. Get more ways to connect. 
http://windowslive.com/howitworks?ocid=TXT_TAGLM_WL_t2_allup_howitworks_022009
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090208/9138059d/attachment.htm>


Current thread: