Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exploit failed to launch #338

Closed
ghost opened this issue Sep 30, 2015 · 9 comments
Closed

Exploit failed to launch #338

ghost opened this issue Sep 30, 2015 · 9 comments

Comments

@ghost
Copy link

ghost commented Sep 30, 2015

Didn't wanted to re-open the other issue because it looks like that only my device gets this problem.

  1. Selected a target, 2) did an inspector scan,3) searched for exploits,4) choosed a shellshock exploit, 5) Error at launch..
    Bug on ver 1.6.0 rc2 ( xperia z3 )
    Here's the logcat :https://gist.github.com/Settix/989c49005e6923bfb334
    Thanks for your time, really appreciated :).
@guibais
Copy link

guibais commented Oct 1, 2015

You need to choose a payload @settix does you know how metasploit works?

@ghost
Copy link
Author

ghost commented Oct 1, 2015

@Haxin-hipopcorn
Sure,I know how msf works, don't worry.I've forgotten to add this step in my description. ( it seemed pretty obvious to me). Anyway, i don't think that it's a payload related problem.. are your exploits launching correctly ? And do you get any opened sessions ?

@tajnymag
Copy link
Contributor

tajnymag commented Oct 1, 2015

At least for me some of the exploits actually show "Job started" toast message, but I've never gotten to any open session. On the other hand, I haven't tested it against a 100% vulnerable device :D

@ghost
Copy link
Author

ghost commented Oct 1, 2015

Ok @tajnymag :)
meh.. guess I will setup a metasploitable virtual machine to test some of the others exploits.

@guibais
Copy link

guibais commented Oct 1, 2015

@settix ok try and say if it worked

@tux-mind
Copy link
Member

tux-mind commented Oct 4, 2015

@settix I increased verbosity in 399e0fe .

please try again with the nigthly build and share a logcat if you can.

thanks for report 😉

NOTE: nightly build get built at 00:00 of Dubai.

@ghost
Copy link
Author

ghost commented Oct 10, 2015

Ok @Tux, i will send you a second logcat ASAP.

@ghost
Copy link
Author

ghost commented Oct 10, 2015

Ok @tux-mind, I've succesfully setup the metasploitable 2 vm but when I edit the options of the choosed payload in csploit, It returns a blank screen and of course the exploit canot be run because it needs options configured :).
I also get weird "denied" msgs from network-radar + nmap + ruby and msf rpc disconneting ??.
Steps done:

  1. Focused scan in inspector tab of my vm
  2. launched exploit finder, it lists tons of exploits but many of them weren't os specific (got windows exploits for my vm)
    3)when trying to edit options = blank screen
    4)when trying to launch exploit = fail (normal).
    Here's the locat (xperia z3 custom rom/kernel)
    https://gist.github.com/Settix/7ee16f8999134bb31082
    Thanks for your time

@tux-mind
Copy link
Member

problem is simple, tents of found exploits are not present in current MSF installation ( 4.11.0 ).
will work on it whence both #220 and the msf_restyling branch get closed/merged.

thanks for the report 😊

requires #220
requires msf_restyling branch to be completed.

@ghost ghost mentioned this issue Oct 14, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants