Metasploit mailing list archives

Cant convert nil into string


From: francis.provencher at msp.gouv.qc.ca (FRANCIS PROVENCHER)
Date: Thu, 20 Dec 2007 16:08:17 -0500

Hi all, i test the new Novell Groupwise module for metasploit 3.1
 
Here is the config;
 
msf exploit(novell_groupwise) > show options
 
Module options:
 
   Name         Current Setting                    Required 
Description
   ----         ---------------                    -------- 
-----------
   BODY                                            no        The body
of the sent email
   MAILFROM     random at example.com                 yes       The FROM
address of the e-mail
   MAILSUBJECT                                     no        The
subject of the sent email
   MAILTO       blablabla at mydomain.com  yes       The TO address of the
e-mail
   RHOST        10.*.*.*.*                      yes       The target
address
   RPORT        25                                 yes       The target
port
 

Payload options:
 
   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  process          yes       Exit technique: seh, thread,
process
   LHOST       10.*.*.*               yes       The local address
   LPORT     4444             yes       The local port
 

Exploit target:
 
   Id  Name
   --  ----
   0   Novell Groupwise 6.5 Universal WIN2000/XP
 

msf exploit(novell_groupwise) > set LHOST 10.*.*.*.*
LHOST => 10.*.*.*
msf exploit(novell_groupwise) > exploit
[*] Started reverse handler
[-] Exploit failed: can't convert nil into String
msf exploit(novell_groupwise) >     
 
Some one know what is  wrong?
thanks!
 
 
Francis Provencher
Minist?re de la S?curit? publique du Qu?bec
Direction des technologies de l'information
Division de la s?curit? informatique
T?l: 1 418 646-3258
Courriel:   Francis.provencher at Msp.gouv.qc.ca 
 
CEH - Certified Ethical Hackers
SSCP - System Security Certified Practitionner
Sec+ - Security +
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071220/dc5e8224/attachment.htm>
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: FRANCIS PROVENCHER.vcf
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071220/dc5e8224/attachment.asc>


Current thread: