Results 1 to 3 of 3

Thread: SMB2 exploit and the reason for low successrate?

  1. #1
    Just burned his ISO
    Join Date
    Dec 2008
    Posts
    9

    Default SMB2 exploit and the reason for low successrate?

    Hello! Well my question is primarly as the topic says, why is there a "low" successrate on the SMB2 exploit (the metasploit version)? More specific in technical terms... Or is it unknown why?

    I find it wierd since i have tried this exploit on two stations, one vista and one windows 7 and the results are different everytime... Just keep spamming and it will eventually work... If the box is unlucky...

  2. #2
    Junior Member
    Join Date
    Sep 2007
    Posts
    28

    Default

    As far as i know it is because of a security measure called ASLR. It stands for address space layout randomization.

    it picks different memory locations to load system services each time the OS is started, making the code that the exploit needs to work in a different location in memory every time.

  3. #3
    Moderator
    Join Date
    Jan 2010
    Posts
    167

    Default

    Quote Originally Posted by hackabear View Post
    Hello! Well my question is primarly as the topic says, why is there a "low" successrate on the SMB2 exploit (the metasploit version)? More specific in technical terms... Or is it unknown why?
    you can read some more details here: Metasploit: SMB2: 351 Packets from the Trampoline

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •