Metasploit mailing list archives

Test failed on sploit of the Microsoft DNS RPC vulnerability


From: hdm at metasploit.com (H D Moore)
Date: Sun, 15 Apr 2007 03:41:41 -0500

The exploit will only work with the development version of the framework, 
can you confirm that you are using the trunk version and not 3.0-stable?

-HD

On Sunday 15 April 2007 03:29, . Solo wrote:
I tested "Microsoft DNS RPC extractQuotedChar() Overflow" with
framework3. I try both of AddUser or Bind shell, however, after filled
?the blank , the exploit console window does appeared and showed the
following error message:



Current thread: