Has anyone managed to get a resolution on this issue?
I have tried all solutions on this forum including reinstalling Metasploit, rolling back Metasploit to v5, disabling firewalls, trying each payload, running msfconsole as sudo.
All config under ‘show options’ is set correctly, RHOSTS as the Lame box and LHOST as the IP of my tun0 adapter.
If anybody could offer any advice or resolution I would be very grateful as I am very stuck and not sure what to try next!
This was driving me crazy for the past 2 hours. This is an easy box so my fragile ego is in shambles (boo hoo). Is there something wrong with this box or am I just doing it wrong?
I have tried the metasploit solution, and I have tried a script I found on the internet. I have tried using the pwnbox os that htb offers as well to do the metasploit solution. Metasploit on both give me the same no session created issue, and the script either isn’t working or cant make it back. Can anyone make me sane again? At this point I feel like someone patched it on me to pull a sick prank.
This is the name of the script, I assume this isn’t spoilers since there’s a writeup but it has the same name as metasploit exploit. You can find it on gitlab if you google search it.
whe running nmap -p 445 -A 10.10.10.3 im getting that the smb version is 3.0.28a instead of the 3.0.20 which is the one in the walkthroughs. Does this make any difference for the exploit?
whe running nmap -p 445 -A 10.10.10.3 im getting that the smb version is 3.0.28a instead of the 3.0.20 which is the one in the walkthroughs. Does this make any difference for the exploit?
I noticed the same thing. The documented exploit only works for version 3.0.20 < 3.0.25rc3 and the current version is 3.0.28a.
I’m still digging, but haven’t found a fix yet. I might try the fix fluffikinz recommends, but it would be nice to know if there was some kind of change in the box/challenge. Seems inconsistent to make such a drastic change after the box is retired and so many have already owned it - to require a completely different tactic.
In case someone else would encounter a problem here … Basically, I’d say that Metasploit, if not specified with LHOST, will use the default network card’s IP. The thing is, because we’re connected to the lab through a VPN, this makes Metasploit listen on the “wrong” interface in this context.
To fix this, you’ll have to change LHOST with the IP address you have on the HTB network (tun0)
Update msf-framework. You will need to go into its /usr/share/metasploit-frame and “bundle install”. From there, your msf will have all updates and upgrade. There is a problem upgrading it in command line.
For LHOST, please try to figure out your IP address and set LHOST to that. Try to choose the right one by Google. You should be fine.
~~Not sure what I did different, but I just skipped this one for about a week and came back to it. Magically msf worked this time. ~~
However I did type in the wrong ip the first time running it, I’m going to chalk it up to either user error or something was wonky with the servers that got fixed. numbors R hard, make sure the connection handler in msf binds and if it doesnt check that your options are correct.
I was going through what I did step by step and realized:
! I used the OTHER samba port! I don’t know if maybe I refused to try that port for some odd reason but that was the issue. That seems like an issue I’d catch, but… seems that isn’t the case. Look at your scan, and try the other ports (if you dont know which one just try all of them, but nmap should give enough info to know which one). Feel dumb lol
I uninstalled metasploit ( sudo apt-get remove --auto-remove metasploit-framework ) and then re-installed the new build from their github repo. Installed it in my /opt folder and then installed all the dependencies (a bunch of ruby gems that will probably need some manual dpkg installs themselves) and now it works.
I guess the defualt Metasploit just didn’t work and upgrading it also didn’t.
This is what I ended up having to do as well. Except I re-installed using apt:
This didn’t help me with the manual exploits though; so there is still something in the 2020.4 kali instance that’s blocking stuff. For Legacy, the Win firewall kept getting enabled somehow, so many resets to figure it out.
Update msf-framework. You will need to go into its /usr/share/metasploit-frame and “bundle install”. From there, your msf will have all updates and upgrade. There is a problem upgrading it in command line.
For LHOST, please try to figure out your IP address and set LHOST to that. Try to choose the right one by Google. You should be fine.
OK changing LHOST to vpn just worked and I got meterpreter after changing through payloads. Now, I have new problem none of meterpreter commands work all end up with error or command unknown. even python is not recognised, priv extension doesn’t load hence getsystem wont work, uname no, getuid no, only thing worked is sysinfo
which says computer name is ‘passage’, OS is Linux Ubuntu and meterpreter-php/linux
help guys