2654835 Posted July 19, 2022 Share Posted July 19, 2022 Hi, i would like to train with metasploit (6.1.39-dev) on a fresh kali VM (kernel 5.16.0-kali7-amd64) against metsaploitable2 VM. Both systems are in an internal network in Virtualbox. The unix/misc/distcc_exec should work for getting into metasploitable2. I have confirmed, that i have set LHOST and RHOST and RPORT correctly and (via netcat) that both machines can talk without any firewall interfering. When issuing `exploit` i get: ``` Started reverse TCP handler on <LHOST> [*]<RHOST> - stderr: bash 22: Bad file descriptor [*]<RHOST> - stderr: bash: /dev/txp/<LHOST>/<LPORT>: No such file or directory [*]<RHOST> - stderr: bash: 22: Bad file descriptor [*] Exploit competed, but no session was created. ``` Exactly the same behavior on a fresh parrot install. Besides that, i also tried a Win XP SP1 SMB exploit without success. What is wrong with my setup/What did i wrong/How to troubleshoot this further? thanks for your help :) Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.