Help me out [Not getting meterpreter console after exploit]

1,564 views
Skip to first unread message

Srini

unread,
Jul 6, 2011, 5:24:22 AM7/6/11
to null
Hi security Legends

am new to pen testing and have one dedicated network setup for
practicing this pen testing. Am using the link
http://www.offensive-security.com/metasploit-unleashed as reference
and practicing the same by adopting the methods step by step which is
provided in this.

My question is am not getting meterpreter console after executing the
exploit using the metasploit, I even tried most the examples which is
provided in the material none of the examples are working for me (Only
meterpreter examples)

I have tried the last example to get the meterpreter console by
exploiting

http://www.offensive-security.com/metasploit-unleashed/Fun_With_Incognito

msf > use exploit/windows/smb/ms08_067_netapi

am getting the message like [*]Exploit completed, but no session was
created.

Just to update you all.. I have all vulnerable targets including the
metasploitable

Can you guys help me where am missing something or do I need to
configure the metasploit itself?

Thanks
Srini

ashi sharma

unread,
Jul 6, 2011, 7:12:04 AM7/6/11
to null-...@googlegroups.com
hii   mate you have to set the payload  as well
RHOST   AND  LHOST    as well  
you will get the meterpreter  no  prob...



--
null - Spreading the right Information
null Mailing list charter: http://null.co.in/section/about/null_list_charter/

This list is supported by Institute of Information Security http://iisecurity.in
Real-world hackers, real-world training – Certified Professional Hacker at IIS (http://iisecurity.in)

ayyappa reddy

unread,
Jul 6, 2011, 11:42:25 AM7/6/11
to null-...@googlegroups.com
This link may help to u regards metapreter..
www.securitytube.net

On Wed, Jul 6, 2011 at 2:54 PM, Srini <srim...@gmail.com> wrote:

Srini

unread,
Jul 7, 2011, 7:11:09 AM7/7/11
to null
Hi Ashi

I have set the RHOST, LHOST, Port and related payload as well
(Mentioned in the link)

But of no use...

Thanks

On Jul 6, 4:12 pm, ashi sharma <ashi.ash...@gmail.com> wrote:
> hii   mate you have to set the payload  as well
> RHOST   AND  LHOST    as well
> you will get the meterpreter  no  prob...
>
>
>
> On Wed, Jul 6, 2011 at 2:54 PM, Srini <srimur...@gmail.com> wrote:
> > Hi security Legends
>
> > am new to pen testing and have one dedicated network setup for
> > practicing this pen testing. Am using the link
> >http://www.offensive-security.com/metasploit-unleashedas reference
> > and practicing the same by adopting the methods step by step which is
> > provided in this.
>
> > My question is am not getting meterpreter console after executing the
> > exploit using the metasploit, I even tried most the examples which is
> > provided in the material none of the examples are working for me (Only
> > meterpreter examples)
>
> > I have tried the last example to get the meterpreter console by
> > exploiting
>
> >http://www.offensive-security.com/metasploit-unleashed/Fun_With_Incog...
>
> > msf > use exploit/windows/smb/ms08_067_netapi
>
> > am getting the message like [*]Exploit completed, but no session was
> > created.
>
> > Just to update you all.. I have all vulnerable targets including the
> > metasploitable
>
> > Can you guys help me where am missing something or do I need to
> > configure the metasploit itself?
>
> > Thanks
> > Srini
>
> > --
> > null - Spreading the right Information
> > null Mailing list charter:
> >http://null.co.in/section/about/null_list_charter/
>
> > This list is supported by Institute of Information Security
> >http://iisecurity.in
> > Real-world hackers, real-world training – Certified Professional Hacker at
> > IIS (http://iisecurity.in)- Hide quoted text -
>
> - Show quoted text -

Vimal™

unread,
Jul 7, 2011, 7:51:38 AM7/7/11
to null-...@googlegroups.com

Check if the 'server' service is running on the target.



/--
Regards
Vimal

Manjunath N.G

unread,
Jul 7, 2011, 7:52:22 AM7/7/11
to null-...@googlegroups.com
can u tel me on which target you are running ms08_067_netapi exploit

regards

Punter

On Thu, Jul 7, 2011 at 4:41 PM, Srini <srim...@gmail.com> wrote:

abhijeet abhijeet

unread,
Jul 7, 2011, 2:04:08 PM7/7/11
to null-...@googlegroups.com
I think he is saying after getting the session back to him he is not seeing "meterpreter>" when he exploited the metasploitable though he is in session.He is just seeing like a session from netcat.I hope i am right. 

Manjunath N.G

unread,
Jul 8, 2011, 2:39:13 AM7/8/11
to null-...@googlegroups.com
how can he run ms08_067_netapi exploit on metasploitable,metasploitable is a ubuntu distro before running the exploit he should first clearly understand his target and exploit.

Punter

Srini

unread,
Jul 8, 2011, 7:55:38 AM7/8/11
to null
Just for your information.. Metasploit running on ubuntu but the
target for the exploit is Windows 2000 SP4.. and also i have tried to
exploit against the target OS's like Windows XP SP2, XP SP3, Windows
Server 2003 SP1 and SP2



On Jul 8, 11:39 am, "Manjunath N.G" <manju...@gmail.com> wrote:
> how can he run ms08_067_netapi exploit on metasploitable,metasploitable is a
> ubuntu distro before running the exploit he should first clearly understand
> his target and exploit.
>
> Punter
>
> On Thu, Jul 7, 2011 at 11:34 PM, abhijeet abhijeet
> <abhijeet9...@gmail.com>wrote:
>
>
>
> > I think he is saying after getting the session back to him he is not seeing
> > "meterpreter>" when he exploited the metasploitable though he is in
> > session.He is just seeing like a session from netcat.I hope i am right.
>
> > On Thu, Jul 7, 2011 at 5:22 PM, Manjunath N.G <manju...@gmail.com> wrote:
>
> >> can u tel me on which target you are running ms08_067_netapi exploit
>
> >> regards
>
> >> Punter
>
> >>> > > IIS (http://iisecurity.in)-Hide quoted text -

Mayur Mahajan

unread,
Jul 9, 2011, 1:23:58 AM7/9/11
to null-...@googlegroups.com


Hello Guys,


ms08_067_netapi exploit will not able to get session in metasploit unless the target machine's firewall is 'ON'. Disable it then try to exploit using ms08_067_netapi with reverse_tcp.



Thanks & Regards,

Mayur Mahajan

C|EH, VA/PT

Jainam Technologies

[M]: +91-9773434139

[W]www.jainamtech.com

JT-png.png




JT-png.png

Srini

unread,
Jul 11, 2011, 7:50:10 AM7/11/11
to null
Hi Mayur

As far as I know Windows 2000 Server will not be having any default
firewalls..

Correct me if am wrong.

Thanks
Srini

On Jul 9, 10:23 am, Mayur Mahajan <mayur.roc...@gmail.com> wrote:
> Hello Guys,
>
> ms08_067_netapi exploit will not able to get session in metasploit unless
> the target machine's firewall is 'ON'. Disable it then try to exploit using
> *ms08_067_netapi *with reverse_tcp.
>
> Thanks & Regards,
>
> *Mayur Mahajan*
>
> *C|EH, VA/PT*
>
> Jainam Technologies
>
> [M]: +91-9773434139
>
> [W]:www.jainamtech.com
>
> [image: JT-png.png]
>
>  JT-png.png
> 28KViewDownload
Reply all
Reply to author
Forward
0 new messages