Metasploit mailing list archives

Finding Shell. more information.


From: ninjatools at hush.com (ninjatools at hush.com)
Date: Mon, 4 Oct 2004 18:15:37 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Serv-u exploit works fine against sp2....

nothing to see here, move along

On Mon, 04 Oct 2004 17:56:11 -0700 H D Moore <hdm at metasploit.com> wrote:
On Monday 04 October 2004 18:52, [Arcangel] wrote:
I dont know if this is important but as it says in the documentation

the Serv-U ftp Server dies when I run the exploit. I have Win XP
SP2.
bye.

The exploit works by overwriting the SEH function pointer, this
technique
will not work with Windows XP SP2. Exploitation is still possible,
either
using some of the techniques in David Litchfield's paper[1] or sending

slightly less data to use the return address overwrite method instead.

-HD

1. http://www.nextgenss.com/papers/defeating-w2k3-stack-protection.pdf
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkFh9bkACgkQtCeTLzI39eMIjACgrQZKw4DIyUc206gwNf0AIploHysA
n1dCnldr6o4+qu/Wgfu0BL2LgkaW
=jrPJ
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
secure FREE email: http://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
http://www.hushmail.com/services-messenger?l=434

Promote security and make money with the Hushmail Affiliate Program: 
http://www.hushmail.com/about-affiliate?l=427



Current thread: