Home page logo

metasploit logo Metasploit mailing list archives

Re: attacking against XP-SP2
From: gargpriyank at gmail.com (priyank garg)
Date: Sun, 10 Jul 2005 16:23:16 +0530

i tried a large no. of targets with XP-SP2 but was unable to exploit
it with any of the payloads available.DCOM and LSASS are not working.

Please tell me is it possible to exploit an XP-SP2.

On 7/8/05, Charles Hamby <fixer at gci.net> wrote:
Do you know which type of firewall?  Some of them don't do any outbound 
filtering, in which case doing a reverse shell shouldn't present a 
problem.  The fact that there is a firewall there yet you can still see 
SMB makes me wonder if the firewall has been misconfigured.  Are you 
scanning from a LAN environment (or the same subnet)?  That would 
explain it.


vajira ganepola wrote:


When scannining against XP service pack2, firewall enabled machine, it
indicates its ports are closed exept for very few ( ex. SMB-445 )

Therefore deploying win32_bind payloads against XP-SP2 wouldnt work.

I wish to know whether I will be able to exploit XP-SP2 with
win32_reversebind payloads.


would it be not possible at all, Since XP-SP2 doesnt support raw sockets.




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]