Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Problem with windows/smb/ms17_010_eternalblue #146

Open
ntoskrnl-exe opened this issue Feb 23, 2019 · 1 comment
Open

Problem with windows/smb/ms17_010_eternalblue #146

ntoskrnl-exe opened this issue Feb 23, 2019 · 1 comment
Labels

Comments

@ntoskrnl-exe
Copy link

ntoskrnl-exe commented Feb 23, 2019

I am getting the following error on the exploit referenced above (I am running a Kali Instance - although I should cavat and say its Kali running in WSL) The target is a French IP, but I doubt its a language issue.

[*] Started reverse TCP handler on 192.168.1.2:4444
[*] 88.202.226.23:445 - Connecting to target for exploitation.
[+] 88.202.226.23:445 - Connection established for exploitation.
[+] 88.202.226.23:445 - Target OS selected valid for OS indicated by SMB reply
[*] 88.202.226.23:445 - CORE raw buffer dump (11 bytes)
[*] 88.202.226.23:445 - 0x00000000  57 69 6e 64 6f 77 73 20 36 2e 31                 Windows 6.1
[+] 88.202.226.23:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[*] 88.202.226.23:445 - Trying exploit with 12 Groom Allocations.
[*] 88.202.226.23:445 - Sending all but last fragment of exploit packet
[-] 88.202.226.23:445 - RubySMB::Error::InvalidPacket
[-] 88.202.226.23:445 - Expecting SMB1 protocol with command=43, got SMB1 protocol with command=50
[-] 88.202.226.23:445 - /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/ruby_smb-1.0.5/lib/ruby_smb/client/echo.rb:21:in `smb1_echo'
/usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/ruby_smb-1.0.5/lib/ruby_smb/client.rb:247:in `echo'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:370:in `smb1_large_buffer'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:211:in `smb_eternalblue'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:125:in `block in exploit'
/usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.11/lib/active_support/core_ext/range/each.rb:7:in `each'
/usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.11/lib/active_support/core_ext/range/each.rb:7:in `each_with_time_with_zone'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:123:in `exploit'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:215:in `job_run_proc'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:169:in `run'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:140:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:165:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:55:in `exploit_single'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:202:in `cmd_exploit'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:522:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:473:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:467:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:467:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:151:in `run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
/usr/bin/msfconsole:49:in `<main>'
[*] Exploit completed, but no session was created.
@shotintoeternity
Copy link

shotintoeternity commented Sep 18, 2020

[*] Started reverse TCP handler on 192.168.119.219:4444 
[*] 10.11.1.146:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[-] 10.11.1.146:445       - Host does NOT appear vulnerable.
[*] 10.11.1.146:445       - Scanned 1 of 1 hosts (100% complete)
[*] 10.11.1.146:445 - Connecting to target for exploitation.
[+] 10.11.1.146:445 - Connection established for exploitation.
[+] 10.11.1.146:445 - Target OS selected valid for OS indicated by SMB reply
[*] 10.11.1.146:445 - CORE raw buffer dump (11 bytes)
[*] 10.11.1.146:445 - 0x00000000  57 69 6e 64 6f 77 73 20 36 2e 31                 Windows 6.1     
[+] 10.11.1.146:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[*] 10.11.1.146:445 - Trying exploit with 12 Groom Allocations.
[*] 10.11.1.146:445 - Sending all but last fragment of exploit packet
[-] 10.11.1.146:445 - RubySMB::Error::InvalidPacket
[-] 10.11.1.146:445 - Expecting SMB1 protocol with command=43, got SMB1 protocol with command=50
[-] 10.11.1.146:445 - /usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/ruby_smb-1.1.0/lib/ruby_smb/client/echo.rb:21:in `smb1_echo'
/usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/ruby_smb-1.1.0/lib/ruby_smb/client.rb:249:in `echo'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:378:in `smb1_large_buffer'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:218:in `smb_eternalblue'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:133:in `block in exploit'
/usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/activesupport-4.2.11.3/lib/active_support/core_ext/range/each.rb:7:in `each'
/usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/activesupport-4.2.11.3/lib/active_support/core_ext/range/each.rb:7:in `each_with_time_with_zone'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb:131:in `exploit'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:215:in `job_run_proc'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:169:in `run'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:140:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:164:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:55:in `exploit_single'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:201:in `cmd_exploit'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:158:in `run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
/usr/bin/msfconsole:23:in `<main>'
[*] Exploit completed, but no session was created.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants