Closed TheNullSec closed 2 years ago
Hello,
Does the antivirus is disabled on the client side ?
Hey, yeah like I said I turned off the firewall and the anti-virus so i don't think it's that. Shouldn't be anything blocking it on the Kali side.
Try to disable everything
Okay I disabled the 'Tamper Protection' on the Windows side and now a connection seems to be made when I try invoke_vnc module, however I now get the following error:
Any suggestions?
module removed
So I've tried using to modules now, the met_inject module and the invoke_vnc module, however with both I keep getting the same error and the module fails to work. With these modules you expect to get a meterpreter shell and a VNC viewer remote connection respectively.
CME VERSION: 5.1.1dev (3TH@n) INSTALL METHOD: zip download (https://github.com/byt3bl33d3r/CrackMapExec/releases/tag/v5.1.1dev) KALI OS VERSION: 2020.1 Windows Machine OS Version: 10.0.19041 N/A Build 19041
Steps to reproduce the behavior for the invoke_vnc module:
vncviewer -listen
python3 cme smb 192.168.106.163 -u {valid local admin username} -p {valid password} -M invoke_vnc -o PORT=5500 PASSWORD=pass
I have a Windows machine at 192.168.106.163 with antivirus and firewall turned off to ensure that it's not the issue.
Steps to reproduce the behaviour for met_inject (I tried many variations such as using different metasploit payloads and SSL options but gave the same error each time):