
Metasploit mailing list archives
small fix on fuser.rb and ttyprompt.rb (exploits/solaris/telnet)
From: rmkml at free.fr (rmkml)
Date: Sun, 23 Aug 2009 09:21:36 +0200 (CEST)
Hi, Metasploit version (svn 13aug2009) have a small pb when I start two old exploits, ok example: msf > use solaris/telnet/fuser msf exploit(fuser) > show payloads msf exploit(fuser) > same pb for ttyprompt.rb (no payloads list) ok my small simplified diff: {joigned two diff unified files} - 'PayloadType' => 'cmd_interact', + 'PayloadType' => 'cmd', ok with small patch: msf > use solaris/telnet/fuser msf exploit(fuser) > show payloads Compatible payloads =================== Name Description ---- ----------- cmd/unix/bind_perl Unix Command Shell, Bind TCP (via perl) cmd/unix/generic Unix Command, Generic command execution cmd/unix/reverse Unix Command Shell, Double reverse TCP (telnet) cmd/unix/reverse_perl Unix Command Shell, Reverse TCP (via perl) msf exploit(fuser) > set PAYLOAD cmd/unix/bind_perl msf exploit(fuser) > set RHOST a.b.c.d msf exploit(fuser) > exploit [*] Started bind handler [*] Setting USER environment variable... ... Regards Rmkml Crusoe-Researches.com -------------- next part -------------- A non-text attachment was scrubbed... Name: metasploitframework33dev13aug2009_telnet_fuser_ttyprompt_payload.diff.gz Type: application/octet-stream Size: 332 bytes Desc: URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090823/4d818448/attachment.obj>
Current thread:
- small fix on fuser.rb and ttyprompt.rb (exploits/solaris/telnet) rmkml (Aug 23)