Hi all,
I have a problem with the psexec exploit. I scanned a target with nessus. Nessus found an unrestrictetd smb share. It even listed the content of the share.
I tried to exploit the system with metasploits exploit/windows/smb/psexec without login credentials and the reverse meterpreter payload. The exploit failed.
At first i thought windows may not accept connections from an unknown host without PW. But how could nessus read the content of the share?
Any ideas?
Greetings,
P0w