Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bug report #19547

Open
daniela2000111 opened this issue Oct 10, 2024 · 1 comment
Open

bug report #19547

daniela2000111 opened this issue Oct 10, 2024 · 1 comment
Labels

Comments

@daniela2000111
Copy link

Started msfconsole.

Ran the command use exploit/windows/smb/ms17_010_eternalblue.

Set the payload to windows/x64/meterpreter/reverse_tcp.

Set the LHOST and LPORT options.

Executed the exploit using run.

Were you following a specific guide/tutorial or reading documentation?
If you were following a guide or tutorial, provide a link to it. If not, you can omit this section.

Example:
Metasploit Unleashed

Expected Behavior
Describe what you expected to happen.

Example:
The exploit should have successfully exploited the target and given me a Meterpreter session.

Current Behavior
Describe what actually happened. Include any error messages or unexpected behavior.

Example:
The exploit failed with the error message: Exploit failed: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).

Metasploit Version
Provide the version of Metasploit you are using. You can get this with the version command in msfconsole.

Example:
Framework: 6.1.11-dev

Additional Information
If your version is less than 5.0.96, please update to the latest version and ensure your issue is still present.

If the issue is encountered within msfconsole, please run the debug command using the instructions below. If the issue is encountered outside msfconsole, or the issue causes msfconsole to crash on startup, please delete this section.

Start msfconsole.

Run the command set loglevel 3.

Take the steps necessary to recreate your issue.

Run the debug command.

Copy all the output below the ===8<=== CUT AND PASTE EVERYTHING BELOW THIS LINE ===8<=== line and make sure to REMOVE ANY SENSITIVE INFORMATION.

Replace these instructions and the paragraph above with the output from step 5.

@adfoster-r7
Copy link
Contributor

The exploit failed with the error message: Exploit failed: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444).

Try changing the LPORT to a different value 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: No status
Development

No branches or pull requests

2 participants