I am new to the area and have been trying to learn from easy retired machines like Lame, Legacy and Optimum, I tried to use the write-ups that HTB offered me and other write-ups made by users and all took me to MetaSploit at some point, but always I will try any exploit in MetaSploit, especially those that the HTB itself recommended, they always got the same result …
[*] Started reverse TCP double handler on 10.10.14.3:4444 [*] Exploit completed, but no session was created.
(multi/samba/usermap_script ← the exploit i use)
all commands lead me to this result, I correctly set RHOSTS as the target, my LHOST as tun0, my VPN is turned on correctly, the machine is turned on and connected to the server I’m on, I’ve tried MetaSploit on Parrot and Windows, even being in the HTB write-up, I checked nmap more than 10 times if the machine is vulnerable to the exploit I’m using, and yet it continues! Does anyone know how to solve?