Closed genaray closed 6 years ago
I don't see you setting a payload here. Can you try:
set payload windows/x64/meterpreter/reverse_https
or similar?
I would like to add better printing around VerifyArch
, since it doesn't use print_core_buffer
. Hopefully this will track down the issue better when it comes up yet again.
@genaray: What you're seeing usually means the target's arch is wrong, but I suspect it's correct and "failing closed" on exploitation for some reason.
So i solved it ... norton blocked every attack... once i disabled it, it went like a charm ! Thanks for your help :grinning:
it, it went like a charm ! Thanks for your help 😀
Can you explain more? Thanks
Im pretty new to metasploit, so i will try to explain my problem as well as i can.
First i set the target to 0, im running Win7 Professional on my machine it is x64 based. Right after that i set the rhost to the certain ipv4.
When i hit exploit/run this shows up :
When i disbale VerifyArch it skips this part and i get this error Message :
RubySMB : ERROR : Communication Error : An error occured reading from the socket
Im totally stuck and have no idea why it wont work... A bit help would be great !