Metasploit mailing list archives
query on exploit/windows/browser/apple_quicktime_rtsp
From: w3bd3vil at gmail.com (webDEViL)
Date: Mon, 9 Feb 2009 08:48:11 +0530
Although I havent used these exploits, common sense tells me that you need to connect to the url with the vulnerability pre-requisites for the shellcode to execute. For eg. a vulnerable version of quicktime and a browser pointing to http://127.0.0.1:4444/CFRhDQoemBCJ . ;-) 2009/2/9 Nitin Kanaskar <nkanaskar at hotmail.com>
hello list I have apple quicktime player 7.1.3 installed on my xp box. and BT3 with metasploit running on the same as a vmware virtual machine. I am trying to run exploit/windows/browser/apple_quicktime_rtsp My options for this exploit are SRVHOST=127.0.0.1 SRVPORT=4444 PAYLOAD= generic/shell_bind_tcp when i run the exploit, i get msg - [*] Using URL http://127.0.0.1:4444/CFRhDQoemBCJ [*] Server started. I see a job with the name windows/browser/apple_quicktime_rtsp in the Jobs tab of msfgui, nothing in sessions tab. I am not able to understand if the exploit ran/failed. Do i need to run quick time from inside my browser on xp? Any help will be highly appreciated. Thanks Nitin ------------------------------ Windows Live?: E-mail. Chat. Share. Get more ways to connect. See how it works.<http://windowslive.com/howitworks?ocid=TXT_TAGLM_WL_t2_allup_howitworks_022009> _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090209/9f57b096/attachment.htm>
Current thread:
- query on exploit/windows/browser/apple_quicktime_rtsp Nitin Kanaskar (Feb 08)
- query on exploit/windows/browser/apple_quicktime_rtsp webDEViL (Feb 08)
- query on exploit/windows/browser/apple_quicktime_rtsp Patrick Webster (Feb 08)
- query on exploit/windows/browser/apple_quicktime_rtsp Nitin Kanaskar (Feb 09)
- Message not available
- query on exploit/windows/browser/apple_quicktime_rtsp Nitin Kanaskar (Feb 09)
- query on exploit/windows/browser/apple_quicktime_rtsp H D Moore (Feb 09)
- query on exploit/windows/browser/apple_quicktime_rtsp Nitin Kanaskar (Feb 09)
- query on exploit/windows/browser/apple_quicktime_rtsp MC (Feb 09)
- query on exploit/windows/browser/apple_quicktime_rtsp Nitin Kanaskar (Feb 09)
- query on exploit/windows/browser/apple_quicktime_rtsp Patrick Webster (Feb 09)
- query on exploit/windows/browser/apple_quicktime_rtsp Patrick Webster (Feb 08)
- query on exploit/windows/browser/apple_quicktime_rtsp webDEViL (Feb 08)
- query on exploit/windows/browser/apple_quicktime_rtsp Donnie Werner (Feb 09)