module

MS04-011 Microsoft Private Communications Transport Overflow

Disclosed
2004-04-13
Created
2018-05-30

Description

This module exploits a buffer overflow in the Microsoft
Windows SSL PCT protocol stack. This code is based on Johnny
Cyberpunk's THC release and has been tested against Windows
2000 and Windows XP. To use this module, specify the remote
port of any SSL service, or the port and protocol of an
application that uses SSL. The only application protocol
supported at this time is SMTP. You only have one chance to
select the correct target, if you are attacking IIS, you may
want to try one of the other exploits first (WebDAV). If
WebDAV does not work, this more than likely means that this
is either Windows 2000 SP4+ or Windows XP (IIS 5.0 vs IIS
5.1). Using the wrong target may not result in an immediate
crash of the remote system.

Author

hdm x@hdm.io

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/ssl/ms04_011_pct
msf exploit(ms04_011_pct) > show targets
...targets...
msf exploit(ms04_011_pct) > set TARGET < target-id >
msf exploit(ms04_011_pct) > show options
...show and set options...
msf exploit(ms04_011_pct) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.