Read request with a specially crafted file name. The SolarWinds TFTP server can be shut down by sending a 'netascii' RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:' Name Current Setting Required Description License: Metasploit Framework License (BSD) Msf6 auxiliary(dos/windows/tftp/solarwinds) > show info Here is how the dos/windows/tftp/solarwinds auxiliary module looks in the msfconsole: msf6 > use auxiliary/dos/windows/tftp/solarwinds RHOSTS: The target host(s), range CIDR identifier, or hosts file with syntax 'file:'.Msf auxiliary(solarwinds) > set TARGET target-id Msf > use auxiliary/dos/windows/tftp/solarwinds More information about ranking can be found here. normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect.'netascii' read request with a specially crafted file name. The SolarWinds TFTP server can be shut down by sending a Source code: modules/auxiliary/dos/windows/tftp/solarwinds.rb Module: auxiliary/dos/windows/tftp/solarwinds Name: SolarWinds TFTP Server 10.4.0.10 Denial of Service Why your exploit completed, but no session was created?. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |