Faheem Posted February 16, 2012 Share Posted February 16, 2012 Hi there, I am using Backtrack 5 on VmWare. Using network configuration as Bridged. Backtrack ip is 192.168.10.181 My host OS is winsows xp sp3 ip 192.168.10.3 both machines can ping each other. Win XP is physically install on my system and using Backtrack as guest OS in VM ware when i exploit the windows vulnerability of remote code execution i.e ms07_067_netapi i face following problem Automatically detecting the target... Fingerprint: Windows XP - Service Pack 3 Selected Target: Windows XP SP3 Attempting to trigger the vulnerability... Exploit completed, but no session was created. Thanks in advance ......... Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 16, 2012 Share Posted February 16, 2012 ms08_067? What interface are you using? I'll guess the web interface? A good resource for metasploit beginners I would suggest are http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training and a book by David "Rel1k" Kennedy http://nostarch.com/metasploit Quote Link to comment Share on other sites More sharing options...
Trcx Posted February 16, 2012 Share Posted February 16, 2012 If I remember right Win XP SP 3 is not vulnerable to MS08_67 unless the sharing service is enabled....it's been a while since I've used that exploit, so I don't really remember. Quote Link to comment Share on other sites More sharing options...
nopenopenope Posted February 16, 2012 Share Posted February 16, 2012 Sounds like you never selected a payload, being that the exploit made it to the target but you were unable to get a sesson because no payload was uploaded. check out this site and watch some video's. http://www.securitytube.net/groups?operation=view&groupId=10 You'll most likely find your problem in one of the first 3 video's Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted February 17, 2012 Share Posted February 17, 2012 No session created will usually mean that the box you are trying to exploit, is not vulnerable to the exploit you are using. Try using a different exploit. Also do a show option and make sure you got all the options set correctly. Quote Link to comment Share on other sites More sharing options...
Doctor Posted February 17, 2012 Share Posted February 17, 2012 Not exactly an expert, but I remember a similar topic started over in /securti. Check to make sure you have your router set to allow port_forwarding to the port you have set under your options for the exploit on the target box. Not sure if it'll be any help though. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.