Metasploit mailing list archives
Re: bug with ms06_040/meterpreter payload
From: HD Moore <hdm () metasploit com>
Date: Fri, 19 Nov 2010 07:51:12 -0600
On 11/19/2010 6:31 AM, Robin Wood wrote:
Not having much luck today, just got this on ms06_040_netapi [*] Started reverse handler on 192.168.0.2:4444 [*] Binding to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER] ... [*] Bound to 4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0@ncacn_np:192.168.0.52[\BROWSER] ... [*] Building the stub data... [-] Exploit exception: undefined method `name' for nil:NilClass [*] Exploit completed, but no session was created.
There is pretty much no reason to ever use ms06-040 -- the ms08-067 exploit supersedes this patch, so if you have a system vulnerable to ms06-040, you should be able to use the (more reliable, more targets) ms08-067 exploit instead. For this specific issue, you may need to set the TARGET to a known target instead of automatic. -HD _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- bug with ms06_040/meterpreter payload Robin Wood (Nov 19)
- Re: bug with ms06_040/meterpreter payload HD Moore (Nov 19)
- Re: bug with ms06_040/meterpreter payload Robin Wood (Nov 19)
- Re: bug with ms06_040/meterpreter payload HD Moore (Nov 19)