Metasploit mailing list archives

small fix on fuser.rb and ttyprompt.rb (exploits/solaris/telnet)


From: rmkml at free.fr (rmkml)
Date: Sun, 23 Aug 2009 09:21:36 +0200 (CEST)

Hi,
Metasploit version (svn 13aug2009) have a small pb when I start two old exploits, ok example:
  msf > use solaris/telnet/fuser
  msf exploit(fuser) > show payloads
  msf exploit(fuser) >
same pb for ttyprompt.rb (no payloads list)

ok my small simplified diff: {joigned two diff unified files}
  - 'PayloadType' => 'cmd_interact',
  + 'PayloadType' => 'cmd',

ok with small patch:
  msf > use solaris/telnet/fuser
  msf exploit(fuser) > show payloads
   Compatible payloads
   ===================
    Name                       Description
    ----                       -----------
    cmd/unix/bind_perl         Unix Command Shell, Bind TCP (via perl)
    cmd/unix/generic           Unix Command, Generic command execution
    cmd/unix/reverse           Unix Command Shell, Double reverse TCP (telnet)
    cmd/unix/reverse_perl      Unix Command Shell, Reverse TCP (via perl)
  msf exploit(fuser) > set PAYLOAD cmd/unix/bind_perl
  msf exploit(fuser) > set RHOST a.b.c.d
  msf exploit(fuser) > exploit
  [*] Started bind handler
  [*] Setting USER environment variable...
  ...

Regards
Rmkml
Crusoe-Researches.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: metasploitframework33dev13aug2009_telnet_fuser_ttyprompt_payload.diff.gz
Type: application/octet-stream
Size: 332 bytes
Desc: 
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090823/4d818448/attachment.obj>


Current thread: