Metasploit mailing list archives

Plugin xmlrpc unload bug?


From: Ulisses Castro <uss.thebug () gmail com>
Date: Wed, 3 Mar 2010 17:07:13 -0300

When I try unload xmlrpc module and check if the server still listen I saw
that the server don't stop.

# ./msfconsole

                __.                       .__.        .__. __.
  _____   _____/  |______    ____________ |  |   ____ |__|/  |_
 /     \_/ __ \   __\__  \  /  ___/\____ \|  |  /  _ \|  \   __\
|  Y Y  \  ___/|  |  / __ \_\___ \ |  |_> >  |_(  <_> )  ||  |
|__|_|  /\___  >__| (____  /____  >|   __/|____/\____/|__||__|
      \/     \/          \/     \/ |__|


       =[ metasploit v3.3.4-dev [core:3.3 api:1.0]
+ -- --=[ 527 exploits - 248 auxiliary
+ -- --=[ 196 payloads - 23 encoders - 8 nops
       =[ svn r8699 updated today (2010.03.03)

msf > load
load      loadpath
msf > load
load auto_add_route  load db_postgres     load db_tracker      load
ips_filter      load pcap_log        load socket_logger   load token_hunter
load db_credcollect  load db_sqlite2      load db_wmap         load
msfd            load sample          load sounds          load xmlrpc
load db_mysql        load db_sqlite3      load event_tester    load
nexpose         load session_tagger  load thread
msf > load xmlrpc -h
[*]  XMLRPC Service: 127.0.0.1:55553
[*] XMLRPC Username: msf
[*] XMLRPC Password: 3tNvwNuO
[*] XMLRPC Server Type: Basic
[*] Successfully loaded plugin: xmlrpc
msf >
msf > unload xmlrpc
Unloading plugin xmlrpc...unloaded.
msf >
msf > netstat -nltupw
[*] exec: netstat -nltupw

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address
State       PID/Program name
tcp        0      0 127.0.0.1:55553         0.0.0.0:*
LISTEN      10280/ruby
tcp        0      0 0.0.0.0:8080            0.0.0.0:*
LISTEN      5837/apache2
tcp        0      0 0.0.0.0:22              0.0.0.0:*
LISTEN      5593/sshd
tcp        0      0 0.0.0.0:8118            0.0.0.0:*
LISTEN      5157/privoxy
tcp        0      0 127.0.0.1:9050          0.0.0.0:*
LISTEN      5169/tor
tcp6       0      0 :::22                   :::*
LISTEN      5593/sshd
udp        0      0 0.0.0.0:68              0.0.0.0:*
9207/dhclient


The server still run...
tcp        0      0 127.0.0.1:55553         0.0.0.0:*
LISTEN      10280/ruby

Best regards,

Ulisses Castro
http://ulissescastro.com
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: