Metasploit mailing list archives
RE: Possible UCE::[framework] Exploit for the Microsoft DNS RPC vulnerability...
From: Jeff.Peadro at allstate.com (Peadro, Jeff)
Date: Sat, 14 Apr 2007 20:03:27 -0500
I am attempting to test this against a W2K DNS Server from a host running XP SP2; the payload being generic/shell_bind_tcp. My Rhost is set to the DNS server, Rport is set to 1030 and Lport being 4444. Upon clicking "Launch Exploit" I receive the following error: [*] Started bind handler [-] Exploit failed: wrong number of arguments (2 for 1) Any thoughts? -----Original Message----- From: H D Moore [mailto:hdm at metasploit.com] Sent: Saturday, April 14, 2007 10:23 AM To: framework at metasploit.com Subject: Possible UCE::[framework] Exploit for the Microsoft DNS RPC vulnerability... This module has been added to the development version of Metasploit 3, it will be merged to 3.0-stable once 2003 support has been completed: http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/dcer pc/msdns_zonename.rb -HD
Current thread:
- Exploit for the Microsoft DNS RPC vulnerability... H D Moore (Apr 14)
- RE: Possible UCE::[framework] Exploit for the Microsoft DNS RPC vulnerability... Peadro, Jeff (Apr 14)
- Message not available
- RE: Possible UCE::[framework] Exploit for the Microsoft DNS RPC vulnerability... Peadro, Jeff (Apr 14)