So, i was testing the metasploit ms_03_026_dcom on a virtual host in a penetration testing lab and noticed some weird behaviour. Datacolor spyder 4 elite cracks. I managed to exploit the target machine just once, using the generic/shell_reverse_tcp payload. After the exploitation was succesfull i decided to exploit it again using meterpreter/reverse_tcp as a payload, but got the 'exploit worked, but no session was created' issue. I tried again with payload set back to generic/shell_reverse_tcp and got the 'no session was created' issue again. The question is why it happened and how is it possible that target that was already exploited cannot be exploited 1 minute after. ![]() The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. ![]() The settings during the first and last succesful exploitation and the later unsuccesful attempts are similar. The target host is a VM, created for penetration testing purposes, no AV is used and no settings were changed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |