Metasploit mailing list archives

solaris/telnet/fuser


From: lazydj98 at yahoo.com (Joshua Smith)
Date: Tue, 14 Oct 2008 13:52:05 -0700 (PDT)

{HD, *}@metasploit.com,
Amazing piece of code.  I'm honestly in awe every time I use it.

All,
I apologize in advance if this ends up being a stupid question.  Also, I'm lucky enough to know the author of this 
module so I put the question to him too, will let the list know if he comes up w/anything

Question:
root at laptop:~/framework-trunk# ./msfcli solaris/telnet/fuser RHOST=192.168.1.1 PAYLOAD=solaris/x86/shell_bind_tcp E
[*] Started bind handler
[*] Setting USER environment variable...
[-] Exploit failed: undefined method `put' for nil:NilClass

Not surprisingly I get the same thing w/the SPARC version

Not important, but when I run 
./msfcli solaris/telnet/fuser RHOST=192.168.1.1 P
I get
Compatible payloads
===================

   Name  Description  
   ----  -----------  
and that's it.  

I'm running Ubuntu 8.04 Hardy Heron, kernel ver: 2.6.24-19, ruby 1.8.6, and I just ran an SVN update
Any ideas?
 -Josh



      
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20081014/4fb2a066/attachment.htm>


Current thread: