Yes it works well. Also works in linux if the shellcode is changed.
I tried the following steps:
2) K menu >> Services >> HTTPD >> Start HTTPD
3) echo "1" > /proc/sys/net/ipv4/ip_forward
4) Edit the configuration file - - /etc/etter.conf to enable iptable
3) ettercap -i wlan0 -Tq -M ARP /192.168.1.1/ // // -P autoadd
I won't mind.... as this is new to me.... :)
PS: I'm on BT4, attacking a vista box with firefox 3.5
Im not sure why you are running ettercap. Just fire up apache, put the exploit in apaches root / and call it index.html. Then take your vista box and browse to the page and calc.exe sohould open on the vulnerable machine.
I haven't used it or looked at it yet, but I updated my metasploit dev a couple of hours ago and I saw a new firefox exploit added, it may well resolve many of your issues.
And, yes when I followed the steps you mentioned (Start Apache with the exploit as index.html, then browse to 192.168.1.2), firefox crashes. May be it's due to vista because it was reported that same thing happens with XP SP3.
on 3.5.1 it didn't seem to have worked. I thought it would work on the whole 3.5.x
all it gave me was the text in the code
Firefox 3.5 Heap Spray Vulnerabilty
Author: SBerry aka Simon Berry-Byrne
Thanks to HD Moore for the insight and Metasploit for the payload
its has been fixed 3.5.1 onwards