Metasploit mailing list archives
solaris fuser no payload available
From: hijacka at googlemail.com (pUm)
Date: Thu, 29 Jan 2009 17:52:42 +0100
Hi all, I am playing around with a solaris installation: specialy the exploit "exploit/solaris/telnet/fuser". I didnt get any payload for this .. anyone an idea why? $ ./msfcli exploit/solaris/telnet/fuser RHOST=172.16.60.33 TARGET=0 P Compatible payloads =================== Name Description ---- ----------- $ I tried: URL: https://metasploit.com/svn/framework3/branches/framework-3.2 Repository Root: https://metasploit.com/svn Repository UUID: 4d416f70-5f16-0410-b530-b9f4589650da Revision: 5963 Node Kind: directory Schedule: normal Last Changed Author: hdm Last Changed Rev: 5963 Last Changed Date: 2008-11-19 09:05:44 +0100 (Mi, 19 Nov 2008) and my default installation: URL: http://metasploit.com/svn/framework3/trunk Repository Root: http://metasploit.com/svn Repository UUID: 4d416f70-5f16-0410-b530-b9f4589650da Revision: 6193 Node Kind: directory Schedule: normal Last Changed Author: druid Last Changed Rev: 6193 Last Changed Date: 2009-01-28 07:13:47 +0100 (Mi, 28 Jan 2009) all on my osx: ruby -v ruby 1.8.6 (2008-03-03 patchlevel 114) [universal-darwin9.0] oh, and the same happens to "ttyprompt", but "exploit/solaris/samba/trans2open" works fine: Compatible payloads =================== Name Description ---- ----------- generic/debug_trap Generate a debug trap in the target process generic/debug_trap/bind_ipv6_tcp Listen for a connection over IPv6, Generate a debug trap in the target process generic/debug_trap/bind_nonx_tcp Listen for a connection (No NX), Generate a debug trap in the target process generic/debug_trap/bind_tcp Listen for a connection, Generate a debug trap in the target process generic/debug_trap/reverse_http Tunnel communication over HTTP using IE 6, Generate a debug trap in the target process generic/debug_trap/reverse_ipv6_tcp Connect back to attacker over IPv6, Generate a debug trap in the target process generic/debug_trap/reverse_nonx_tcp Connect back to the attacker (No NX), Generate a debug trap in the target process generic/debug_trap/reverse_ord_tcp Connect back to the attacker, Generate a debug trap in the target process generic/debug_trap/reverse_tcp Connect back to the attacker, Generate a debug trap in the target process generic/shell_bind_tcp Listen for a connection and spawn a command shell generic/shell_reverse_tcp Connect back to attacker and spawn a command shell solaris/x86/shell_bind_tcp Listen for a connection and spawn a command shell solaris/x86/shell_reverse_tcp Connect back to attacker and spawn a command shell cheers sven
Current thread:
- solaris fuser no payload available pUm (Jan 29)
- solaris fuser no payload available webDEViL (Jan 29)