Metasploit mailing list archives
Queries on CABRIGHTSTOR exploit
From: jerome.athias at free.fr (Jerome Athias)
Date: Thu, 27 Oct 2005 09:41:53 +0200
Hi, I never tested this one. did you edit the exploit module? You should check the "available space" information to see how many space is available for a payload. Then, read the author's comments, i think it was only tested on Win XP SP1... As Mr Miller said, maybe the address is not correct for your target... Good luck /JA
The vulnerable machine is on internet. But I also tried the CMD execution payload which I feel should work in this case. And there isn't a bind payload for this module. Any idea how can I create one? I would appreciate some more pointers from experts.
-------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 5213 bytes Desc: S/MIME Cryptographic Signature URL: <http://mail.metasploit.com/pipermail/framework/attachments/20051027/81e68d77/attachment.bin>
Current thread:
- Queries on CABRIGHTSTOR exploit 3 shool (Oct 26)
- Queries on CABRIGHTSTOR exploit mmiller at hick.org (Oct 26)
- Queries on CABRIGHTSTOR exploit 3 shool (Oct 26)
- Queries on CABRIGHTSTOR exploit Jerome Athias (Oct 27)
- Queries on CABRIGHTSTOR exploit 3 shool (Oct 27)
- Queries on CABRIGHTSTOR exploit Jerome Athias (Oct 27)
- Queries on CABRIGHTSTOR exploit 3 shool (Oct 26)
- Queries on CABRIGHTSTOR exploit mmiller at hick.org (Oct 27)
- Queries on CABRIGHTSTOR exploit mmiller at hick.org (Oct 26)