Metasploit mailing list archives
snortbopre exploit help
From: security at thegeekzone.com (Security)
Date: Fri, 13 Apr 2007 10:16:56 -0500
Hello, I am terribly sorry if I should not be posting this to this list. If there is a better location for this type of question please let me know and I'll move along. I am having issues getting the snortbopre exploit to run properly with the Metasploit Framework 3 at revision 4670 (just updated). I am getting an error that says "Exploit failed: wrong number of arguments (0 for 1)" when attempting to exploit a Debian 3.1 system that's running Snort 2.3.3. I realize that this is not one of the exploitable versions of Snort but I am curious to find out if I am using the framework or exploit incorrectly or if the error is because the system is not vulnerable to the exploit. Does anyone have any suggestions? Exploit: linux/ids/snortbopre Target: Debian 3.1 Sarge Payload: generic/shell_reverse_tcp RHOST 192.168.0.135 (Snort IP) RPORT 9080 LHOST 192.168.0.138 (Metasploit IP) LPORT 4444 Thanks, Ben
Current thread:
- snortbopre exploit help Security (Apr 13)
- snortbopre exploit help mmiller at hick.org (Apr 13)
- Message not available
- Message not available
- FWD: snortbopre exploit help Security (Apr 18)
- Message not available
- snortbopre exploit help mmiller at hick.org (Apr 13)