I have a problem with the psexec exploit. I scanned a target with nessus. Nessus found an unrestrictetd smb share. It even listed the content of the share.
I tried to exploit the system with metasploits exploit/windows/smb/psexec without login credentials and the reverse meterpreter payload. The exploit failed.
At first i thought windows may not accept connections from an unknown host without PW. But how could nessus read the content of the share?
psexec on windows share with no password
in Security
Posted
Hi all,
I have a problem with the psexec exploit. I scanned a target with nessus. Nessus found an unrestrictetd smb share. It even listed the content of the share.
I tried to exploit the system with metasploits exploit/windows/smb/psexec without login credentials and the reverse meterpreter payload. The exploit failed.
At first i thought windows may not accept connections from an unknown host without PW. But how could nessus read the content of the share?
Any ideas?
Greetings,
P0w