Metasploit mailing list archives
small fix on fuser.rb and ttyprompt.rb (exploits/solaris/telnet)
From: rmkml at free.fr (rmkml)
Date: Sun, 23 Aug 2009 09:21:36 +0200 (CEST)
Hi,
Metasploit version (svn 13aug2009) have a small pb when I start two old exploits, ok example:
msf > use solaris/telnet/fuser
msf exploit(fuser) > show payloads
msf exploit(fuser) >
same pb for ttyprompt.rb (no payloads list)
ok my small simplified diff: {joigned two diff unified files}
- 'PayloadType' => 'cmd_interact',
+ 'PayloadType' => 'cmd',
ok with small patch:
msf > use solaris/telnet/fuser
msf exploit(fuser) > show payloads
Compatible payloads
===================
Name Description
---- -----------
cmd/unix/bind_perl Unix Command Shell, Bind TCP (via perl)
cmd/unix/generic Unix Command, Generic command execution
cmd/unix/reverse Unix Command Shell, Double reverse TCP (telnet)
cmd/unix/reverse_perl Unix Command Shell, Reverse TCP (via perl)
msf exploit(fuser) > set PAYLOAD cmd/unix/bind_perl
msf exploit(fuser) > set RHOST a.b.c.d
msf exploit(fuser) > exploit
[*] Started bind handler
[*] Setting USER environment variable...
...
Regards
Rmkml
Crusoe-Researches.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: metasploitframework33dev13aug2009_telnet_fuser_ttyprompt_payload.diff.gz
Type: application/octet-stream
Size: 332 bytes
Desc:
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090823/4d818448/attachment.obj>
Current thread:
- small fix on fuser.rb and ttyprompt.rb (exploits/solaris/telnet) rmkml (Aug 23)
