Metasploit mailing list archives

query on exploit/windows/browser/apple_quicktime_rtsp


From: w3bd3vil at gmail.com (webDEViL)
Date: Mon, 9 Feb 2009 08:48:11 +0530

Although I havent used these exploits, common sense tells me that you need
to connect to the url with the vulnerability pre-requisites for the
shellcode to execute. For eg. a vulnerable version of quicktime and a
browser pointing to http://127.0.0.1:4444/CFRhDQoemBCJ . ;-)



2009/2/9 Nitin Kanaskar <nkanaskar at hotmail.com>


hello list

I have apple quicktime player 7.1.3 installed on my xp box.
and BT3 with metasploit running on the same as a vmware virtual machine.
I am trying to run  exploit/windows/browser/apple_quicktime_rtsp
My options for this exploit are

SRVHOST=127.0.0.1
SRVPORT=4444

PAYLOAD= generic/shell_bind_tcp

when i run the exploit, i get msg -

[*] Using URL http://127.0.0.1:4444/CFRhDQoemBCJ
[*] Server started.

I see a job with the name windows/browser/apple_quicktime_rtsp
in the Jobs tab of msfgui, nothing in sessions tab.
I am not able to understand if the exploit ran/failed.

Do i need to run quick time from inside my browser on xp?

Any help will be highly appreciated.

Thanks
Nitin

------------------------------
Windows Live?: E-mail. Chat. Share. Get more ways to connect. See how it
works.<http://windowslive.com/howitworks?ocid=TXT_TAGLM_WL_t2_allup_howitworks_022009>

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090209/9f57b096/attachment.htm>


Current thread: