Metasploit mailing list archives
MS03-051
From: Glinares at PCOnsite.com (Greg Linares)
Date: Wed, 6 Sep 2006 11:33:51 -0700
That makes sense, I didn't even think about that option. On a side note/request, is there any news of developing MS06-035 and MS06-036 modules? I've noticed that many computers are still vulnerable to the MS06-035 exploit, particularly ones that have patched against the MS06-040 (which seemed to gotten all the buzz). Maybe the MS06-035 method doesn't offer as much of a vector/payload room or has severe byte restrictions. I haven't looked that detailed into it. And yes, we care dearly :) -----Original Message----- From: H D Moore [mailto:hdm at metasploit.com] Sent: Wednesday, September 06, 2006 10:58 AM To: framework at metasploit.com Subject: Re: [framework] MS03-051 The way around those limitations is to use Meterpreter as the payload. The exploit itself shouldn't be responsible for anything that happens after code execution starts. When exploiting ISAPI bugs on IIS 5.1, you have to use Meterpreter (and the 'revert' command) to actually get a command shell, since the IUSR account doesn't have access to cmd.exe, but the IWAM account does. Glad to see that people care about this stuff :-) -HD On Wednesday 06 September 2006 12:52, Greg Linares wrote:
Oh well, yeah that iis_fp30reg_chunked exploit has its limitations, I think it just runs code in the context of IUSR_BROWSER, although there is a plethora of pipe-hijacking\privlidge escalation code that could
be
ran in conjuction with it.
Current thread:
- MS03-051 jack ciabatta (Sep 06)