Metasploit mailing list archives
Finding Shell. DEBUGLEVEL 5.
From: hdm at metasploit.com (H D Moore)
Date: Tue, 5 Oct 2004 10:34:06 -0500
Could you try using the win32_bind_vncinject or win32_reverse_vncinject payloads? It looks suspiciously like the exploited FTP service does not have the require privileges to execute cmd.exe. The vnc injection payload should be able to work around this (and function just fine anyways, via RevertToSelf and other tricks). -HD On Tuesday 05 October 2004 09:17, [Arcangel] wrote:
I tried with debuglevel 5 and only show me the this aditional information --> "KILLING CHILD:2960" [*] Starting Bind Handler. [*] REMOTE> 220 ftp Server Ready... [*] REMOTE> 331 User name okay, need password. [*] REMOTE> 230 User logged in, proceed. [*] REMOTE> 227 Entering Passive Mode (127.0.0.1, 4,106) [*] Trying to explot target ServU 5.0.0.0 ServUDaemon.exe [*] Got Connection from 127.0.0.1:114
Current thread:
- Finding Shell. DEBUGLEVEL 5. Arcangel (Oct 05)
- Finding Shell. DEBUGLEVEL 5. H D Moore (Oct 05)