Metasploit mailing list archives
msfcli
From: krasn at ans.gr (Nicolas Krassas)
Date: Fri, 27 Mar 2009 13:02:42 +0200
Greetings, I've encountered a strange problem on msfcli, i'm pasting the lines below, root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx E [*] Please wait while we load the module tree... ./msfcli:150: undefined method `datastore' for nil:NilClass (NoMethodError) root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482 DisableCourtesyShell=TRUE E [*] Please wait while we load the module tree... [*] Handler binding to LHOST 0.0.0.0 [*] Started reverse handler [*] Starting the payload handler... [-] Exploit failed: Here above i just pressed ctrl c to interrupt the cli root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx LPORT 4444 DisableCourtesyShell=TRUE E [*] Please wait while we load the module tree... ./lib/msf/core/data_store.rb:93:in `each': The argument could not be parsed correctly. (Rex::ArgumentParseError) from ./lib/msf/core/data_store.rb:93:in `import_options_from_s' from ./msfcli:140 Again error when i'm using the correct ip address of the host, ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp E [*] Please wait while we load the module tree... [-] Exploit failed: The following options failed to validate: LHOST. And finally root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=91.xxx.xx.xxx E [*] Please wait while we load the module tree... [*] Handler binding to LHOST 0.0.0.0 [*] Started reverse handler [*] Starting the payload handler... The commands where used one after the other, no change was done on the system in between. Regards, Dinos