I have already tried many things, but I have problems in the Lab “NBT-NS Poisoning and Exploitation with Responder”.
For me simply the exploit does not work, I copy the Powershell command down but it does not work.
I also found this post: Lab 11 but it didn’t help me either.
By this point ./MultiRelay.py should be fully working.
With
use exploit/multi/script/web_delivery
make sure you do
set payload windows/x64/meterpreter/reverse_tcp
When you paste the command into your MultiRelay terminal/shell., you may initially see errors like: “write failed” / “sharing violation” but it shouldn’t matter; You should have a meterpreter session in your metasploit terminal now.
If you are still having issues, show all of your work from the beginning please.