Open holdon1996 opened 7 years ago
isnt bind_tcp should be done in background??
i've got the same here and plus :
msf auxiliary(scanner/smb/smb_ms17_010) > exploit
[+] 192.168.1.28:445 - Host is likely VULNERABLE to MS17-010! - Windows 8.1 Pro 9600 x64 (64-bit) [] Scanned 1 of 1 hosts (100% complete) [] Auxiliary module execution completed
but when a use the eternelblue exploit and show options i've just :
Exploit target:
Id Name
8 Windows 7 (all services pack) (x86) (x64)
No windows 8....
Change it to explorer.exe and try changing architecture too or maybe it's antivirus.
When I set payload windows/x64/meterpreter/bind_tcp error : This value specified for payload is not valid . And when I set payload windows/meterpreter/bind_tcp -> It's OK but not run ( Error getting output...) Windows Victim is 7 Pro(x64)