AnsweredAssumed Answered

Uncompatible Payload

Question asked by Hackware Wright on Jun 9, 2017

I opened msfconsole  and used this exploit


AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 Buffer Overflow

-------------------------------------------------------------------------------- -------------------------------------

msf > use exploit/aix/rpc_cmsd_opcode21

msf exploit(rpc_cmsd_opcode21) > show options


Module options (exploit/aix/rpc_cmsd_opcode21):


   Name   Current Setting  Required  Description

   ----   ---------------  --------  -----------

   RHOST                   yes       The target address

   RPORT  111              yes       The target port (TCP)

-------------------------------------------------------------------------------- -------------------------------------

I setted up RHOST to the target ip adress(website's ip adress) and as RPORT 111 was not available so i setted up RPORT to 80(http) Everything happened fine, but at the time of setting the payload this is what happened.

-------------------------------------------------------------------------------- -------------------------------------

msf exploit(rpc_cmsd_opcode21) > set PAYLOAD windows/meterpreter/reverse_tcp

PAYLOAD => windows/meterpreter/reverse_tcp


msf exploit(rpc_cmsd_opcode21) > exploit


[-] - Exploit failed: windows/meterpreter/reverse_tcp is not a compatible payload.

[*] Exploit completed, but no session was created.

-------------------------------------------------------------------------------- ------------------------------------

I even changed Payload to windows/shell_bind_tcp, but nothing worked.

Please suggest me another payload or route to execute this exploit.

If you can please suggest me a good exploit for my target

- Microsoft IIS 7.5(Vulnerable to Denial of Service)

- Windows 7 SP1


Thank you