I figured out the exploit and double checked with nmap and metapsloit that is matched with the same OS version.
but when I run it in meta there is no session created, I changed the ports but the problem is still appear.
any hint to complete?
Hello Ghani, if the exploit is running correctly then the issue is with the connection delivered by the payload. You need to consider a scenario where there's a firewall in place.
Keep us posted!
admin how to bypass the firewall?