DOS Windows 7 metode share folder
#11
Nice Share om... Smile

Nga rugi Ngabung disini.. Mantap >Big Grin<

#12
nice share om...!!!!

ijin nyoba....

#13
ane coba ko gni ya om ?

Spoiler! :

msf auxiliary(ms10_054_queryfs_pool_overflow) > exploit

[-] Auxiliary failed: Rex:Tongueroto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_BAD_NETWORK_NAME (Command=117 WordCount=0)
[-] Call stack:
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:215:in `smb_recv_parse'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:1069:in `tree_connect'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/simpleclient.rb:275:in `connect'
[-] /opt/metasploit/msf3/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb:107:in `run'
[*] Auxiliary module execution completed


apanya yg salah ya ?

#14
(11-13-2012, 01:59 PM)tracer.bazz Wrote: ane coba ko gni ya om ?

Spoiler! :

msf auxiliary(ms10_054_queryfs_pool_overflow) > exploit

[-] Auxiliary failed: Rex:Tongueroto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_BAD_NETWORK_NAME (Command=117 WordCount=0)
[-] Call stack:
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:215:in `smb_recv_parse'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:1069:in `tree_connect'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/simpleclient.rb:275:in `connect'
[-] /opt/metasploit/msf3/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb:107:in `run'
[*] Auxiliary module execution completed


apanya yg salah ya ?

coba dari awal lagi,, di nmap dlu IP nya... set RHOST sama set SMBSHARE jgn lupa

#15
(11-13-2012, 02:42 PM)xnod_die Wrote:
(11-13-2012, 01:59 PM)tracer.bazz Wrote: ane coba ko gni ya om ?

Spoiler! :

msf auxiliary(ms10_054_queryfs_pool_overflow) > exploit

[-] Auxiliary failed: Rex:Tongueroto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_BAD_NETWORK_NAME (Command=117 WordCount=0)
[-] Call stack:
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:215:in `smb_recv_parse'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:1069:in `tree_connect'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/simpleclient.rb:275:in `connect'
[-] /opt/metasploit/msf3/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb:107:in `run'
[*] Auxiliary module execution completed


apanya yg salah ya ?

coba dari awal lagi,, di nmap dlu IP nya... set RHOST sama set SMBSHARE jgn lupa

udh semua om,ane ikuti langkah2nya pas d exploit jadi'y kya gtu.
mngkin metasploit ane yg error

#16
coba di update deh metasploitnya... Big Grin

#17
(11-13-2012, 10:26 PM)tracer.bazz Wrote:
(11-13-2012, 02:42 PM)xnod_die Wrote:
(11-13-2012, 01:59 PM)tracer.bazz Wrote: ane coba ko gni ya om ?

Spoiler! :

msf auxiliary(ms10_054_queryfs_pool_overflow) > exploit

[-] Auxiliary failed: Rex:Tongueroto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_BAD_NETWORK_NAME (Command=117 WordCount=0)
[-] Call stack:
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:215:in `smb_recv_parse'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:1069:in `tree_connect'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/simpleclient.rb:275:in `connect'
[-] /opt/metasploit/msf3/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb:107:in `run'
[*] Auxiliary module execution completed


apanya yg salah ya ?

coba dari awal lagi,, di nmap dlu IP nya... set RHOST sama set SMBSHARE jgn lupa

udh semua om,ane ikuti langkah2nya pas d exploit jadi'y kya gtu.
mngkin metasploit ane yg error

dilihat dari errornya sepertinya samba target tidak vulnerable, target udah dipastikan vulnerable blom?

#18
(11-13-2012, 10:26 PM)tracer.bazz Wrote:
(11-13-2012, 02:42 PM)xnod_die Wrote:
(11-13-2012, 01:59 PM)tracer.bazz Wrote: ane coba ko gni ya om ?

Spoiler! :

msf auxiliary(ms10_054_queryfs_pool_overflow) > exploit

[-] Auxiliary failed: Rex:Tongueroto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_BAD_NETWORK_NAME (Command=117 WordCount=0)
[-] Call stack:
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:215:in `smb_recv_parse'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:1069:in `tree_connect'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/simpleclient.rb:275:in `connect'
[-] /opt/metasploit/msf3/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb:107:in `run'
[*] Auxiliary module execution completed


apanya yg salah ya ?

coba dari awal lagi,, di nmap dlu IP nya... set RHOST sama set SMBSHARE jgn lupa

udh semua om,ane ikuti langkah2nya pas d exploit jadi'y kya gtu.
mngkin metasploit ane yg error

salah ngetik foldernya coba di cek lagi

ane dulu juga gitu ternyata salah ngetik nama folder yang di sharing

#19
(11-14-2012, 05:52 AM)konspirasi Wrote:
(11-13-2012, 10:26 PM)tracer.bazz Wrote:
(11-13-2012, 02:42 PM)xnod_die Wrote:
(11-13-2012, 01:59 PM)tracer.bazz Wrote: ane coba ko gni ya om ?

Spoiler! :

msf auxiliary(ms10_054_queryfs_pool_overflow) > exploit

[-] Auxiliary failed: Rex:Tongueroto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_BAD_NETWORK_NAME (Command=117 WordCount=0)
[-] Call stack:
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:215:in `smb_recv_parse'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/client.rb:1069:in `tree_connect'
[-] /opt/metasploit/msf3/lib/rex/proto/smb/simpleclient.rb:275:in `connect'
[-] /opt/metasploit/msf3/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb:107:in `run'
[*] Auxiliary module execution completed


apanya yg salah ya ?

coba dari awal lagi,, di nmap dlu IP nya... set RHOST sama set SMBSHARE jgn lupa

udh semua om,ane ikuti langkah2nya pas d exploit jadi'y kya gtu.
mngkin metasploit ane yg error

dilihat dari errornya sepertinya samba target tidak vulnerable, target udah dipastikan vulnerable blom?

iya om ternyata target tidak vulnerable, itu ane nyoba d target win 8.
begitu ane coba d win 7 berhasil :-bd
ane kira win 8 ma win7 sama aja karena dari base yg sama :p
ane lg explore bug d win 8
dunia hitam putih lebih berwarna

#20
Izin menyimak. Sedang mikir nyari target. Angry






Users browsing this thread: 1 Guest(s)