RE: Pen Test help

From: Juda Barnes (judab@pent900.com)
Date: Sun Jul 17 2005 - 15:32:51 EDT


Hi Moore

        I have thought about this options therefor I tried to use the CMD
options (I didn't know we have check command)
        Anyway the machine have 53/tcp open port so if I will have the
right exploit I will be able to bind to 53 the shell

        till there I am scrue ;-(

msf iis50_webdav_ntdll(win32_exec) > check
[*] Server does not appear to be vulnerable

:(

Well I tried most of the framework exploits none of them work.

Looking for furthere info

Thank you

 

-----Original Message-----
From: H D Moore [mailto:sflist@digitaloffense.net]
Sent: Saturday, July 16, 2005 9:39 PM
To: pen-test@securityfocus.com
Subject: Re: Pen Test help

Could it be that the firewall is preventing you from accessing the
win32_bind port and blocking the outbound connection from win32_reverse?
You may want to try exploiting this from an external system and using
win32_reverse with a different LPORT value (53, 25, 80, etc). If the "check"
command in the WebDAV exploit thinks the system is vulnerable, there is a
pretty good chance that it is.

-HD

On Saturday 16 July 2005 10:14, Juda Barnes wrote:
> I allready used that I am unable to get win32_reverse or win32_bind
>
> With the two exploits nsiislog_post and webdav_ntdll
>
> Any other ideas ?
>
> -----Original Message-----
> From: er t [mailto:er587@hotmail.com]
> Sent: Friday, July 15, 2005 5:48 PM
> To: securityfocus@mymail.pent900.com; pen-test@securityfocus.com
> Subject: RE: Pen Test help
>
> Try Metasploit
>
> NSIISLOG.DLL -
> http://www.metasploit.com/projects/Framework/exploits.html#iis_nsiislog
>_post WebDav Remote exploit MS03-007 -
> http://www.metasploit.com/projects/Framework/exploits.html#iis50_webdav
>_ntdl l



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:35 EDT