EvilZone
Community => General discussion => : bp80228 October 31, 2014, 01:56:54 PM
-
Hi,
i am receiving "failed to load module:{module name}" in some payloads.
my command is
use payload/windows/reverse_tcp
but if i use shell_bind_tcp, for example, there's no error. its working.
do you know what could be the problem? i browsed the internet but couldnt find any useful info.
-
Wrong payload? Stop being a skiddie, I got abused for it ;)
Although if you are using payloads, find the vulnerability, then search online for known Payloads and if they work great, if not write your own :)
-
first i found that RDP vulnerability but then i found some other vulnerabilities to get into so i dont need to waste my time on it . I was going to make RDP but it seems i can get the SQL database and maybe drop it after make a copy. :)
just practicing.
-
I guess, its
use payload/windows/meterpreter/reverse_tcp
-
Hi,
i am receiving
my command is
but if i use shell_bind_tcp, for example, there's no error. its working.
do you know what could be the problem? i browsed the internet but couldnt find any useful info.
Insted of "use" Have you tried using "get"
That may work
anyways what type of linux are you using?
-Devnith
-
anyways what type of linux are you using?
-Devnith
Lol, you should read title of the topic again.
And it's " set PAYLOAD" what OP should use AFAIK and check that path is correct with search.
-
On the first hand what you ask doesn't exist and you probably need this as the OP said:
I guess, its
use payload/windows/meterpreter/reverse_tcp
On the other hand -_-
Lol, you should read title of the topic again.
And it's " set PAYLOAD" what OP should use AFAIK and check that your path is correct with search.
Focus please. Get some tutorial or something before you start posting dump questions.
-
Loading that isn't very nice :P But have you tried the GET method yet?
-
On the first hand what you ask doesn't exist and you probably need this as the OP said:
On the other hand -_-
Focus please. Get some tutorial or something before you start posting dump questions.
Thank you to point it out again.. :)
-
Well I thought that both M1lak0's and gray-fox's answers together was the perfect answer for the OP so I joined them together thats all. 8)
-
Well guys i was working in the VM and i think some are not loading after msfconsole command. Then after some struggles i swithed to dualboot installation with win7 and kali linux then i did not see any error like this I think it was related with the installation or something like this.
But, now i am dealing with "exploit completed, but no session was created"
- Stared reers handler on {local ip}
- Connecting to the target [target ip:port]...
[ - ] Exploit failed [unreachable] : Rex : :ConnetionTimeout The connection timed out (target ip:port).
- Eploit compleed, but no session was created
msf exploit (ms09_050_smb2_negotiate_func_index) >
any ideas?
-
Well guys i was working in the VM and i think some are not loading after msfconsole command. Then after some struggles i swithed to dualboot installation with win7 and kali linux then i did not see any error like this I think it was related with the installation or something like this.
But, now i am dealing with "exploit completed, but no session was created"
any ideas?
This propably tells that your target isn't vulnerable for exploit you used. Seriously, read some tutorials and use google.
And most importantly consider that maybe this is not yet thing you should be practising. Maybe you should try wargames or something(for example in overthewire.org) to learn more about basic stuff and there you can go to more challenging things step by step.
There is no use of only knowing how metasploit works. That just makes you true skid. But remember that i'm just trying to give you constructive criticism.