Blak3 Posted January 8, 2012 Share Posted January 8, 2012 Hi there. I saw some very experienced guys when we talk about pentesting. Maybe i am new here, and i came with a reason. I think i can find some help here, and i would like to solve my problem(im 3 days locked at home trying to solve this -.-), so lets begin I dont know what the hell is wrong with my backtrack. As i see everyone(except me) has a folder framework3 in /pentest/exploits/(later i saw, that /pentest/exploits/framework should be = /opt/framework/msf3 = the one above). My msf is up to date v 4.2.0 but still i got are folders, framework and framework2. Nvm that, i tried exploiting non updated windows xp systems and this is what i've got so far -.- THIS IS ON SP3 ----using the payload windows/download_exec [-] Exploit failed: No encoders encoded the buffer successfully. [*] Exploit completed, but no session was created. also on sp3 ----using the payload bind_tcp Automatically detecting the target... Fingerprint: Windows XP - Service Pack 3 Selected Target: Windows XP SP3 (NX) Attempting to trigger the vulnerability... Exploit completed, but no session was created. sux right? Anyway now tried on sp2 ----using the payload reverse_tcp [*] Started reverse handler on 10.10.10.137:4444 [-] Exploit exception: The connection timed out (10.10.10.139:445). [*] Exploit completed, but no session was created. also tried with download_exec but forgot to copy the output, anyway the last output stays same("Exploit completed, but no session was created"). I need help of this badly because i cannot keep pentesting anything else everything seems screw'd up <_<. Hope i get this done Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.