Hi Ashi
I have set the RHOST, LHOST, Port and related payload as well
(Mentioned in the link)
But of no use...
Thanks
On Jul 6, 4:12 pm, ashi sharma <
ashi.ash...@gmail.com> wrote:
> hii mate you have to set the payload as well
> RHOST AND LHOST as well
> you will get the meterpreter no prob...
>
>
>
> On Wed, Jul 6, 2011 at 2:54 PM, Srini <
srimur...@gmail.com> wrote:
> > Hi security Legends
>
> > am new to pen testing and have one dedicated network setup for
> > practicing this pen testing. Am using the link
> >
http://www.offensive-security.com/metasploit-unleashedas reference
> > and practicing the same by adopting the methods step by step which is
> > provided in this.
>
> > My question is am not getting meterpreter console after executing the
> > exploit using the metasploit, I even tried most the examples which is
> > provided in the material none of the examples are working for me (Only
> > meterpreter examples)
>
> > I have tried the last example to get the meterpreter console by
> > exploiting
>
> >
http://www.offensive-security.com/metasploit-unleashed/Fun_With_Incog...
>
> > msf > use exploit/windows/smb/ms08_067_netapi
>
> > am getting the message like [*]Exploit completed, but no session was
> > created.
>
> > Just to update you all.. I have all vulnerable targets including the
> > metasploitable
>
> > Can you guys help me where am missing something or do I need to
> > configure the metasploit itself?
>
> > Thanks
> > Srini
>
> > --
> > null - Spreading the right Information
> > null Mailing list charter:
> >
http://null.co.in/section/about/null_list_charter/
>
> > This list is supported by Institute of Information Security
> >
http://iisecurity.in
> > Real-world hackers, real-world training – Certified Professional Hacker at
> > IIS (
http://iisecurity.in)- Hide quoted text -
>
> - Show quoted text -