Metasploit mailing list archives

New problem here.


From: professor0110 at gmail.com (Professor 0110)
Date: Sat, 18 Apr 2009 17:32:37 +1000

Hi Patrick,

I'm using this exploit: windows/iis/ms01_033_idq

I've set the remote port to: 80  with the vulnerable IIS web server.

I'm using the following payload: windows/shell_bind_tcp

With LPORT set to 4444.

I run the exploit and this is the output: (note: I've edited the IP
addresses out)

sf exploit(ms01_033_idq) > exploit
[*] Started bind handler
[*] Command shell session 1 opened (192.168.x.x:38845 -> x.x.x.x:4444)
[*] Trying target Windows 2000 Pro English SP0...
[-] Exploit failed: undefined method `put' for nil:NilClass
[*] Exploit completed, but no session was created.

On Fri, Apr 17, 2009 at 2:37 PM, Patrick Webster <patrick at aushack.com>wrote:

Can you provide more information as to the module name and settings?

-Patrick

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090418/9d3db373/attachment.htm>


Current thread: