Hello,
i’m trying my first retired machine legacy and i followed the official instruction
it’s suppose to work directly with the exploit exploit/windows/smb/ms08_067_netapi
So i set the rhost with the destination IP
use exploit/windows/smb/ms08_067_netapi
[] Started reverse TCP handler on 192.168.1.49:4444
[] 10.129.111.71:445 - Automatically detecting the target…
[] 10.129.111.71:445 - Fingerprint: Windows XP - Service Pack 3 - lang:English
[] 10.129.111.71:445 - Selected Target: Windows XP SP3 English (AlwaysOn NX)
[] 10.129.111.71:445 - Attempting to trigger the vulnerability…
[] Exploit completed, but no session was created.
I get this message every time don’t understand why ?
I also set targets 6 (english) same result
i reset the vm several time same result
reboot kali same !
It should work what @mav3n mentioned. A good thing to remember is if you use msf to run the command show OPTIONS. This will show you all variables which can be configured.
i’m getting 10.129.1.111:445 - Exploit failed: Rex::Proto::SMB::Execptions::ErrorCode The server responded with error: STATUS_OBJECT_NAME_NOT_FOUND (Command=162 WordCount=0)
Exploit completed, but no session was created
I think retired machines are quite unstable and useless when it comes to exploits
it’s 2024 and both blue and legacy machine don’t longer work for me even if I set the exploits correctly as they display on writeups. in my case my target should be 6 Windows XP SP3 English (AlwaysOn NX) but I’m always getting the same errors.
Guess I’ll have to move to recent machines even though new ones are harder to exploit for a beginner like me