Metasploit mailing list archives

snortbopre exploit help


From: security at thegeekzone.com (Security)
Date: Fri, 13 Apr 2007 10:16:56 -0500

Hello, I am terribly sorry if I should not be posting this to this list. 
If there is a better location for this type of question please let me 
know and I'll move along.

I am having issues getting the snortbopre exploit to run properly with 
the Metasploit Framework 3 at revision 4670 (just updated). I am getting 
an error that says "Exploit failed: wrong number of arguments (0 for 1)" 
when attempting to exploit a Debian 3.1 system that's running Snort 
2.3.3. I realize that this is not one of the exploitable versions of 
Snort but I am curious to find out if I am using the framework or 
exploit incorrectly or if the error is because the system is not 
vulnerable to the exploit. Does anyone have any suggestions?

Exploit: linux/ids/snortbopre
Target: Debian 3.1 Sarge
Payload: generic/shell_reverse_tcp

RHOST 192.168.0.135 (Snort IP)
RPORT 9080
LHOST 192.168.0.138 (Metasploit IP)
LPORT 4444

Thanks,

Ben



Current thread: