Metasploit mailing list archives

Re: bug with ms06_040/meterpreter payload


From: Robin Wood <robin () digininja org>
Date: Fri, 19 Nov 2010 13:57:04 +0000

On 19 November 2010 13:51, HD Moore <hdm () metasploit com> wrote:
On 11/19/2010 6:31 AM, Robin Wood wrote:
Not having much luck today, just got this on ms06_040_netapi

[*] Started reverse handler on 192.168.0.2:4444
[*] Binding to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER]
...
[*] Bound to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER]
...
[*] Building the stub data...
[-] Exploit exception: undefined method `name' for nil:NilClass
[*] Exploit completed, but no session was created.

There is pretty much no reason to ever use ms06-040 -- the ms08-067
exploit supersedes this patch, so if you have a system vulnerable to
ms06-040, you should be able to use the (more reliable, more targets)
ms08-067 exploit instead.

For this specific issue, you may need to set the TARGET to a known
target instead of automatic.


I'm just playing, teaching a course next week and just walking through
the list of vulns that Nessus picks out and checking which you have
exploits for and which work.

I'll try specifying a target and see what happens.

Robin
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: