Metasploit mailing list archives
some payload error at attack ipv6 host, can't make connection
From: gleader at gmail.com (gleader)
Date: Wed, 20 Aug 2008 06:59:34 +0800
I am research about ipv6 + exploit.
I learn metasploit. i know it support ipv6 but when I use it ,there some
question about it .
when i am use ms03_026_dcom exploit to a test machine.Ipv4 is ok and can
test many times.
but ipv6 i can exploit but payload can't connection.
I only use adduser payload ,it is ok
but bind_tcp and reversed_tcp all is wrong .
please help me.
i see some payload code example:
payloads/windows/shell_reverse_tcp.rb
'Offsets' =>
{
'LPORT' => [ 166, 'n' ],
'LHOST' => [ 160, 'ADDR' ],
'EXITFUNC' => [ 278, 'V' ],
},
the LHOST 160-166 only 6 . ipv6 address is 128
so perphaps there is some wrong to support ipv6.
sorry my english is poor.
please help me .
what I can do change it .
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20080820/5835a133/attachment.htm>
Current thread:
- some payload error at attack ipv6 host, can't make connection gleader (Aug 19)
- some payload error at attack ipv6 host, can't make connection H D Moore (Aug 19)
