Metasploit mailing list archives
solaris/telnet/fuser
From: lazydj98 at yahoo.com (Joshua Smith)
Date: Tue, 14 Oct 2008 13:52:05 -0700 (PDT)
{HD, *}@metasploit.com, Amazing piece of code. I'm honestly in awe every time I use it. All, I apologize in advance if this ends up being a stupid question. Also, I'm lucky enough to know the author of this module so I put the question to him too, will let the list know if he comes up w/anything Question: root at laptop:~/framework-trunk# ./msfcli solaris/telnet/fuser RHOST=192.168.1.1 PAYLOAD=solaris/x86/shell_bind_tcp E [*] Started bind handler [*] Setting USER environment variable... [-] Exploit failed: undefined method `put' for nil:NilClass Not surprisingly I get the same thing w/the SPARC version Not important, but when I run ./msfcli solaris/telnet/fuser RHOST=192.168.1.1 P I get Compatible payloads =================== Name Description ---- ----------- and that's it. I'm running Ubuntu 8.04 Hardy Heron, kernel ver: 2.6.24-19, ruby 1.8.6, and I just ran an SVN update Any ideas? -Josh -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20081014/4fb2a066/attachment.htm>
Current thread:
- solaris/telnet/fuser Joshua Smith (Oct 14)
- solaris/telnet/fuser H D Moore (Oct 14)
- solaris/telnet/fuser MC (Oct 14)
- <Possible follow-ups>
- solaris/telnet/fuser Joshua Smith (Oct 14)