I assume this will not work on a firewalled pc? Will test later when I get a chance
"Default firewall settings" means port 445 open????
Don't eat yellow snow :rolleyes:
Nice tutorial. Tried it on Windows XP SP3 and worked as soon as file and printer sharing was enabled in the firewall.
The windows/smb/ms08_067_netapi exploit can naturally also be used from within metasploit which will allow you to easily change the payload, for example to meterpreter.
-Monkeys are like nature's humans.
Got everyone's permission last lunch break at school, and amazingly (at a
computer school), 3 out of the 15 XP users were vulnerable (SP3). I created a text
file on everyone's desktop linking to the patch :b.
I would recommend the Metasploit module as Tron says too. Combine it with the scanner/smb/version module and your prepared (:
- Poul Wittig
I was only posting a alternate way to do it.I would recommend the Metasploit module as Tron says too. Combine it with the scanner/smb/version module and your prepared (:
Oh yeah and people do take care when using smb-check-vulns.nse. "Out of 82 vulnerable systems scanned, 52 crashed." :P
- Poul Wittig
You have to break a few eggs to make a omeletOut of 82 vulnerable systems scanned, 52 crashed.
First of all, let me state this is an excellent thread. Haven't had one of these in months. Thanks pureh@te!
QuadCore AMD Phenon X4 9950, 2600 MHz
8GB DDR2 800MHz
Dual Boot System: Windows Server 2008 x64 w/ Hyper-V, Ubuntu 9.10 x64