Telefonica / Eternalblue-Doublepulsar-Metasploit

Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.
GNU Lesser General Public License v2.1
1.09k stars 520 forks source link

cannot connect to host #85

Open Lucas03lescure opened 5 years ago

Lucas03lescure commented 5 years ago

i runned eternalblue and configured everything corectly but this still pops up no matter what

Started reverse TCP handler on 192.168.9.188:4444 [] 192.168.10.188:4444 - Connecting to target for exploitation. [-] 192.168.10.188:4444 - Rex::ConnectionRefused: The connection was refused by the remote host (192.168.10.188:4444). [] Exploit completed, but no session was created.

0xtensho commented 5 years ago

@Lucas03lescure Of course, you tried to do it on the port 4444, which is not open ! Scan for open ports with nmap then try with them...

Lucas03lescure commented 5 years ago

oof i've forgoten about this thread lol, thanks for the advice though it makes sense now though if I do recall correctly the port 4444 was indeed open

0xtensho commented 5 years ago

Yes I know it's an old thread, and I wanted to see if it was patched... And yes it is. So I guess your Windows version was patched against this exploit

Le mar. 20 août 2019 à 09:13, Lucas03lescure notifications@github.com a écrit :

oof i've forgoten about this thread lol, thanks for the advice though it makes sense now though if I do recall correctly the port 4444 was indeed open

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit/issues/85?email_source=notifications&email_token=AL6LOUNEMHBTXWE67XL2RNDQFOKRDA5CNFSM4F5W2KLKYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD4VJY2I#issuecomment-522886249, or mute the thread https://github.com/notifications/unsubscribe-auth/AL6LOUIXTY5HRGUJBSL6TLDQFOKRDANCNFSM4F5W2KLA .

GetRektBoy724 commented 4 years ago

@Lucas03lescure Of course, you tried to do it on the port 4444, which is not open ! Scan for open ports with nmap then try with them...

Kinda funny tho lmao