You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
nmap shows 445 is open, however when attempting to run the exploit I get a socket timeout issue.
PORT STATE SERVICE REASON VERSION
445/tcp open microsoft-ds? syn-ack
Traceback (most recent call last):
File "exploit.py", line 465, in <module>
do_rce(args.ip, args.port)
File "exploit.py", line 426, in do_rce
find_low_stub(ip, port)
File "exploit.py", line 405, in find_low_stub
buff = read_physmem_primitive(ip, port, index)
File "exploit.py", line 205, in read_physmem_primitive
buff = try_read_physmem_primitive(ip, port, phys_addr)
File "exploit.py", line 212, in try_read_physmem_primitive
write_primitive(ip, port, fake_mdl, pmdl_va)
File "exploit.py", line 182, in write_primitive
sock.recv(1000)
socket.timeout: timed out
Am I missing something stupid?
Thanks
The text was updated successfully, but these errors were encountered:
nmap shows 445 is open, however when attempting to run the exploit I get a socket timeout issue.
Am I missing something stupid?
Thanks
The text was updated successfully, but these errors were encountered: