Metasploit mailing list archives
Cant convert nil into string
From: francis.provencher at msp.gouv.qc.ca (FRANCIS PROVENCHER)
Date: Thu, 20 Dec 2007 16:08:17 -0500
Hi all, i test the new Novell Groupwise module for metasploit 3.1 Here is the config; msf exploit(novell_groupwise) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- BODY no The body of the sent email MAILFROM random at example.com yes The FROM address of the e-mail MAILSUBJECT no The subject of the sent email MAILTO blablabla at mydomain.com yes The TO address of the e-mail RHOST 10.*.*.*.* yes The target address RPORT 25 yes The target port Payload options: Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique: seh, thread, process LHOST 10.*.*.* yes The local address LPORT 4444 yes The local port Exploit target: Id Name -- ---- 0 Novell Groupwise 6.5 Universal WIN2000/XP msf exploit(novell_groupwise) > set LHOST 10.*.*.*.* LHOST => 10.*.*.* msf exploit(novell_groupwise) > exploit [*] Started reverse handler [-] Exploit failed: can't convert nil into String msf exploit(novell_groupwise) > Some one know what is wrong? thanks! Francis Provencher Minist?re de la S?curit? publique du Qu?bec Direction des technologies de l'information Division de la s?curit? informatique T?l: 1 418 646-3258 Courriel: Francis.provencher at Msp.gouv.qc.ca CEH - Certified Ethical Hackers SSCP - System Security Certified Practitionner Sec+ - Security + -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071220/dc5e8224/attachment.htm> -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: FRANCIS PROVENCHER.vcf URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071220/dc5e8224/attachment.asc>
Current thread:
- Cant convert nil into string FRANCIS PROVENCHER (Dec 20)