当前位置:网站首页>Metasploit (MSF) uses MS17_ 010 (eternal blue) encoding:: undefined conversionerror problem

Metasploit (MSF) uses MS17_ 010 (eternal blue) encoding:: undefined conversionerror problem

2022-07-05 22:29:00 Muheng HK

Metasploit utilize ms17_010( Eternal Blue )

Use process

Make sure the target plane and kali In the same network segment , You can... Each other Ping through

The firewall of the target is closed , Open the 445 port

Input search ms17_010

Search for blue holes in eternity

 

 

 

use exploit/windows/smb/ms17_010_eternalblue

Exploit attack

use 0

 

 

 option

 

 

 

among Required yes yes All must be configured and configured correctly

Rhost It's the target machine IP

Set as the target IP

set rhosts 192.168.204.137

 

 Payload That's all right.

 

 

Exploit

exploit

 

 

 

The following problems occurred

 

 

  Facing this situation, I have collected information on the Internet for a long time , No answer found , Most of them are about the problems that occurred before this step , what ping No Ping no , Whether the target firewall is turned off, wait

however , My problem is not , At first glance , It seems that there is a coding problem Encoding And so on. , But how to solve this problem .

resolvent :

          to update Metasploit

          1、apt-get update
          2、apt-get install metasploit-framework

          3、shutdown -s -t 0 (windows Server 2008 R2)( Restart the target )

          4、reboot( restart kali) 

Problem solving

 

原网站

版权声明
本文为[Muheng HK]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/186/202207052224156545.html