SMB2 exploit and the reason for low successrate?
Hello! Well my question is primarly as the topic says, why is there a "low" successrate on the SMB2 exploit (the metasploit version)? More specific in technical terms... Or is it unknown why?
I find it wierd since i have tried this exploit on two stations, one vista and one windows 7 and the results are different everytime... Just keep spamming and it will eventually work... If the box is unlucky...
As far as i know it is because of a security measure called ASLR. It stands for address space layout randomization.
it picks different memory locations to load system services each time the OS is started, making the code that the exploit needs to work in a different location in memory every time.
you can read some more details here: Metasploit: SMB2: 351 Packets from the Trampoline
Originally Posted by hackabear