Metasploit mailing list archives

solaris fuser no payload available


From: hijacka at googlemail.com (pUm)
Date: Thu, 29 Jan 2009 17:52:42 +0100

Hi all,

I am playing around with a solaris installation: specialy the exploit
"exploit/solaris/telnet/fuser". I didnt get any payload for this ..
anyone an idea why?
$ ./msfcli exploit/solaris/telnet/fuser RHOST=172.16.60.33 TARGET=0 P

Compatible payloads
===================

   Name  Description
   ----  -----------

$

I tried:
URL: https://metasploit.com/svn/framework3/branches/framework-3.2
Repository Root: https://metasploit.com/svn
Repository UUID: 4d416f70-5f16-0410-b530-b9f4589650da
Revision: 5963
Node Kind: directory
Schedule: normal
Last Changed Author: hdm
Last Changed Rev: 5963
Last Changed Date: 2008-11-19 09:05:44 +0100 (Mi, 19 Nov 2008)

and my default installation:
URL: http://metasploit.com/svn/framework3/trunk
Repository Root: http://metasploit.com/svn
Repository UUID: 4d416f70-5f16-0410-b530-b9f4589650da
Revision: 6193
Node Kind: directory
Schedule: normal
Last Changed Author: druid
Last Changed Rev: 6193
Last Changed Date: 2009-01-28 07:13:47 +0100 (Mi, 28 Jan 2009)

all on my osx:
ruby -v
ruby 1.8.6 (2008-03-03 patchlevel 114) [universal-darwin9.0]

oh, and the same happens to "ttyprompt", but
"exploit/solaris/samba/trans2open" works fine:
Compatible payloads
===================

   Name                                 Description
   ----                                 -----------
   generic/debug_trap                   Generate a debug trap in the
target process
   generic/debug_trap/bind_ipv6_tcp     Listen for a connection over
IPv6, Generate a debug trap in the target process
   generic/debug_trap/bind_nonx_tcp     Listen for a connection (No
NX), Generate a debug trap in the target process
   generic/debug_trap/bind_tcp          Listen for a connection,
Generate a debug trap in the target process
   generic/debug_trap/reverse_http      Tunnel communication over HTTP
using IE 6, Generate a debug trap in the target process
   generic/debug_trap/reverse_ipv6_tcp  Connect back to attacker over
IPv6, Generate a debug trap in the target process
   generic/debug_trap/reverse_nonx_tcp  Connect back to the attacker
(No NX), Generate a debug trap in the target process
   generic/debug_trap/reverse_ord_tcp   Connect back to the attacker,
Generate a debug trap in the target process
   generic/debug_trap/reverse_tcp       Connect back to the attacker,
Generate a debug trap in the target process
   generic/shell_bind_tcp               Listen for a connection and
spawn a command shell
   generic/shell_reverse_tcp            Connect back to attacker and
spawn a command shell
   solaris/x86/shell_bind_tcp           Listen for a connection and
spawn a command shell
   solaris/x86/shell_reverse_tcp        Connect back to attacker and
spawn a command shell

cheers

sven



Current thread: