Hi there. I saw some very experienced guys when we talk about pentesting. Maybe i am new here, and i came with a reason. I think i can find some help here, and i would like to solve my problem(im 3 days locked at home trying to solve this -.-), so lets begin
I dont know what the hell is wrong with my backtrack. As i see everyone(except me) has a folder framework3 in /pentest/exploits/(later i saw, that /pentest/exploits/framework should be = /opt/framework/msf3 = the one above). My msf is up to date v 4.2.0 but still i got are folders, framework and framework2. Nvm that, i tried exploiting non updated windows xp systems and this is what i've got so far -.-
THIS IS ON SP3
----using the payload windows/download_exec
[-] Exploit failed: No encoders encoded the buffer successfully.
[*] Exploit completed, but no session was created.
also on sp3
----using the payload bind_tcp
Automatically detecting the target...
Fingerprint: Windows XP - Service Pack 3
Selected Target: Windows XP SP3 (NX)
Attempting to trigger the vulnerability...
Exploit completed, but no session was created.
sux right?
Anyway now tried on sp2
----using the payload reverse_tcp
[*] Started reverse handler on 10.10.10.137:4444
[-] Exploit exception: The connection timed out (10.10.10.139:445).
[*] Exploit completed, but no session was created.
also tried with download_exec but forgot to copy the output, anyway the last output stays same("Exploit completed, but no session was created").
I need help of this badly because i cannot keep pentesting anything else everything seems screw'd up <_<. Hope i get this done