Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

i am getting issue with attack on armitage metasploit. please help #19047

Closed
haideralialibuchh opened this issue Apr 2, 2024 · 2 comments
Closed
Labels

Comments

@haideralialibuchh
Copy link

Module/Datastore

The following global/module datastore, and database setup was configured before the issue occurred:

Collapse
[framework/core]
LHOST=
LPORT=
loglevel=3

[framework/ui/console]
ActiveModule=exploit/unix/ftp/vsftpd_234_backdoor

[unix/ftp/vsftpd_234_backdoor]
RHOSTS=
TARGET=
LHOST=
LPORT=
PAYLOAD=cmd/unix/interact
RPORT=
WORKSPACE=
VERBOSE=false
WfsDelay=2
EnableContextEncoding=false
ContextInformationFile=
DisablePayloadHandler=false
SSL=false
SSLServerNameIndication=
SSLVersion=Auto
SSLVerifyMode=PEER
SSLCipher=
Proxies=
CPORT=
CHOST=
ConnectTimeout=10
TCP::max_send_size=0
TCP::send_delay=0

Database Configuration

The database contains the following information:

Collapse
Session Type: Connected to msf. Connection type: postgresql.
ID Hosts Vulnerabilities Notes Services
1 (Current) 4 0 5 9
Total (1) 4 0 5 9

History

The following commands were ran during the session and before this issue occurred:

Collapse

Framework Errors

The following framework errors occurred before the issue occurred:

Collapse
[04/02/2024 06:31:05] [e(0)] core: Failed to connect to the database: connection to server at "::1", port 5432 failed: Connection refused
	Is the server running on that host and accepting TCP/IP connections?
connection to server at "127.0.0.1", port 5432 failed: Connection refused
	Is the server running on that host and accepting TCP/IP connections?

[04/02/2024 06:32:32] [e(0)] core: Thread Exception: WebConsoleShell  critical=false    source:
    /usr/share/metasploit-framework/lib/msf/ui/web/web_console.rb:84:in `initialize'
    /usr/share/metasploit-framework/lib/msf/ui/web/driver.rb:62:in `new'
    /usr/share/metasploit-framework/lib/msf/ui/web/driver.rb:62:in `create_console'
    /usr/share/metasploit-framework/lib/msf/core/rpc/v10/rpc_console.rb:28:in `rpc_create'
    /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:143:in `block in process'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:186:in `block in timeout'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:41:in `handle_timeout'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:195:in `timeout'
    /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:143:in `process'
    /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:81:in `on_request_uri'
    /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:62:in `block in start'
    /usr/share/metasploit-framework/lib/rex/proto/http/handler/proc.rb:38:in `on_request'
    /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:316:in `dispatch_request'
    /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:250:in `on_client_data'
    /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:109:in `block in start'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:42:in `on_client_data'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:185:in `block in monitor_clients'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:184:in `each'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:184:in `monitor_clients'
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:64:in `block in start'
    /usr/share/metasploit-framework/lib/rex/thread_factory.rb:22:in `block in spawn'
    /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:105:in `block in spawn' - ThreadError can't alloc thread
[04/02/2024 06:41:17] [e(0)] core: /usr/share/metasploit-framework/modules/exploits/linux/smtp/haraka.py failed to load - SyntaxError /usr/share/metasploit-framework/modules/exploits/linux/smtp/haraka.py:23: syntax error, unexpected ':', expecting end-of-input
[04/02/2024 06:42:22] [e(0)] core: Exploit failed (unix/ftp/proftpd_133c_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b8459a70 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b8459a70 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8454ac0 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8454a48 @lsock=#<TCPSocket:fd 16, AF_INET, 127.0.0.1, 44575>, @rsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 51224>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/proftpd_133c_backdoor) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8454ac0 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8454a48 @lsock=#<TCPSocket:fd 16, AF_INET, 127.0.0.1, 44575>, @rsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 51224>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/proftpd_133c_backdoor) > ">
Did you mean?  prompting?
               prompt
               prompt=
[04/02/2024 06:42:45] [e(0)] core: Exploit failed (unix/ftp/proftpd_133c_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bbaf1448 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bbaf1448 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bbb5a290 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bbb5a1f0 @lsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 44481>, @rsock=#<TCPSocket:fd 11, AF_INET, 127.0.0.1, 55690>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/proftpd_133c_backdoor) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bbb5a290 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bbb5a1f0 @lsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 44481>, @rsock=#<TCPSocket:fd 11, AF_INET, 127.0.0.1, 55690>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/proftpd_133c_backdoor) > ">
Did you mean?  prompting?
               prompt
               prompt=
[04/02/2024 06:43:08] [e(0)] core: Exploit failed (multi/ftp/pureftpd_bash_env_exec) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993960c50 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993960c50 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff993963fb8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff993963f18 @lsock=#<TCPSocket:fd 28, AF_INET, 127.0.0.1, 44619>, @rsock=#<TCPSocket:fd 27, AF_INET, 127.0.0.1, 42218>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 ...>, @input=nil, @prompt=\"msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff993963fb8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff993963f18 @lsock=#<TCPSocket:fd 28, AF_INET, 127.0.0.1, 44619>, @rsock=#<TCPSocket:fd 27, AF_INET, 127.0.0.1, 42218>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 ...>, @input=nil, @prompt="msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > ">
Did you mean?  prompting?
               prompt
               prompt=
[04/02/2024 06:43:41] [e(0)] core: Exploit failed (multi/ftp/pureftpd_bash_env_exec) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b86312a8 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b86312a8 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8626178 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8625e08 @lsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 36219>, @rsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 39448>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 ...>, @input=nil, @prompt=\"msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8626178 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8625e08 @lsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 36219>, @rsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 39448>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 ...>, @input=nil, @prompt="msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > ">
Did you mean?  prompting?
               prompt
               prompt=
[04/02/2024 06:46:26] [e(0)] core: Exploit failed (unix/ftp/proftpd_133c_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bb14ab38 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bb14ab38 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bb145e30 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bb145de0 @lsock=#<TCPSocket:fd 34, AF_INET, 127.0.0.1, 41995>, @rsock=#<TCPSocket:fd 32, AF_INET, 127.0.0.1, 53374>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/proftpd_133c_backdoor) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bb145e30 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bb145de0 @lsock=#<TCPSocket:fd 34, AF_INET, 127.0.0.1, 41995>, @rsock=#<TCPSocket:fd 32, AF_INET, 127.0.0.1, 53374>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/proftpd_133c_backdoor) > ">
Did you mean?  prompting?
               prompt
               prompt=
[04/02/2024 06:49:24] [e(0)] core: Exploit failed (unix/ftp/vsftpd_234_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993171210 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993171210 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9931ce1b8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9931ce118 @lsock=#<TCPSocket:fd 30, AF_INET, 127.0.0.1, 40521>, @rsock=#<TCPSocket:fd 29, AF_INET, 127.0.0.1, 47996>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/vsftpd_234_backdoor) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9931ce1b8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9931ce118 @lsock=#<TCPSocket:fd 30, AF_INET, 127.0.0.1, 40521>, @rsock=#<TCPSocket:fd 29, AF_INET, 127.0.0.1, 47996>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/vsftpd_234_backdoor) > ">
Did you mean?  prompting?
               prompt
               prompt=
Call stack:
/usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `ensure in without_prompt'
/usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `without_prompt'
/usr/share/metasploit-framework/lib/msf/core/module/alert.rb:245:in `alert_user'
/usr/share/metasploit-framework/lib/msf/core/module/ui.rb:21:in `init_ui'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:71:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:172:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:45:in `exploit_single'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:188:in `cmd_exploit'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:581:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:530:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:165:in `block in run'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:309:in `block in with_history_manager_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell/history_manager.rb:35:in `with_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:306:in `with_history_manager_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:133:in `run'
/usr/share/metasploit-framework/lib/msf/ui/web/web_console.rb:84:in `block in initialize'
/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:105:in `block in spawn'
/usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/logging-2.3.1/lib/logging/diagnostic_context.rb:474:in `block in create_with_logging_context'
[04/02/2024 06:50:10] [e(0)] core: Exploit failed (unix/ftp/vsftpd_234_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9c9002060 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9c9002060 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9c8fe0f78 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9c8fe0ed8 @lsock=#<TCPSocket:fd 18, AF_INET, 127.0.0.1, 46321>, @rsock=#<TCPSocket:fd 17, AF_INET, 127.0.0.1, 33818>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/vsftpd_234_backdoor) > \">\nDid you mean?  prompting?\n               prompt\n               prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9c8fe0f78 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9c8fe0ed8 @lsock=#<TCPSocket:fd 18, AF_INET, 127.0.0.1, 46321>, @rsock=#<TCPSocket:fd 17, AF_INET, 127.0.0.1, 33818>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/vsftpd_234_backdoor) > ">
Did you mean?  prompting?
               prompt
               prompt=
Call stack:
/usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `ensure in without_prompt'
/usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `without_prompt'
/usr/share/metasploit-framework/lib/msf/core/module/alert.rb:245:in `alert_user'
/usr/share/metasploit-framework/lib/msf/core/module/ui.rb:21:in `init_ui'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:71:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:172:in `exploit_simple'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:45:in `exploit_single'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:188:in `cmd_exploit'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:581:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:530:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:165:in `block in run'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:309:in `block in with_history_manager_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell/history_manager.rb:35:in `with_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:306:in `with_history_manager_context'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:133:in `run'
/usr/share/metasploit-framework/lib/msf/ui/web/web_console.rb:84:in `block in initialize'
/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:105:in `block in spawn'
/usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/logging-2.3.1/lib/logging/diagnostic_context.rb:474:in `block in create_with_logging_context'

Web Service Errors

The following web service errors occurred before the issue occurred:

Collapse
msf-ws.log does not exist.

Framework Logs

The following framework logs were recorded before the issue occurred:

Collapse
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsbe/reverse_tcp and stage linux/mipsle/meterpreter have incompatible architectures: mipsbe - mipsle
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage bsd/x86/shell have incompatible platforms: ["Linux"] - ["BSD"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage bsdi/x86/shell have incompatible platforms: ["Linux"] - ["BSDi"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage android/shell have incompatible platforms: ["Linux"] - ["Android"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage android/meterpreter have incompatible platforms: ["Linux"] - ["Android"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage netware/shell have incompatible platforms: ["Linux"] - ["Netware"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage php/meterpreter have incompatible platforms: ["Linux"] - ["PHP"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/patchupdllinject have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/upexec have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/patchupmeterpreter have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/custom have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/custom have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/shell have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/meterpreter have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/peinject have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/vncinject have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/shell have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/meterpreter have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/peinject have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/dllinject have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/vncinject have incompatible platforms: ["Linux"] - ["Windows"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage java/shell have incompatible platforms: ["Linux"] - ["Java"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage java/meterpreter have incompatible platforms: ["Linux"] - ["Java"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage multi/meterpreter have incompatible platforms: ["Linux"] - ["Multi"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/aarch64/meterpreter have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/armle/execute have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/armle/shell have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x86/bundleinject have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x86/isight have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x86/vforkshell have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x64/dupandexecve have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x64/meterpreter have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/ppc/shell have incompatible platforms: ["Linux"] - ["OSX"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage python/meterpreter have incompatible platforms: ["Linux"] - ["Python"]
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/aarch64/shell have incompatible architectures: mipsle - aarch64
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/aarch64/meterpreter have incompatible architectures: mipsle - aarch64
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/armle/shell have incompatible architectures: mipsle - armle
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/armle/meterpreter have incompatible architectures: mipsle - armle
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x86/shell have incompatible architectures: mipsle - x86
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x86/meterpreter have incompatible architectures: mipsle - x86
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x64/shell have incompatible architectures: mipsle - x64
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x64/meterpreter have incompatible architectures: mipsle - x64
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/mipsbe/shell have incompatible architectures: mipsle - mipsbe
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/mipsbe/meterpreter have incompatible architectures: mipsle - mipsbe
[04/02/2024 06:50:21] [d(1)] core: Module  is compatible with 
[04/02/2024 06:50:21] [d(1)] core: Module  is compatible with 
[04/02/2024 06:50:21] [d(2)] core: Built staged payload linux/mipsle/shell/reverse_tcp.
[04/02/2024 06:50:21] [d(1)] core: Module  is compatible with 
[04/02/2024 06:50:21] [d(1)] core: Module  is compatible with 
[04/02/2024 06:50:21] [d(2)] core: Built staged payload linux/mipsle/meterpreter/reverse_tcp.

Web Service Logs

The following web service logs were recorded before the issue occurred:

Collapse
msf-ws.log does not exist.

Version/Install

The versions and install method of your Metasploit setup:

Collapse
Framework: 6.3.55-dev
Ruby: ruby 3.1.2p20 (2022-04-12 revision 4491bb740a) [x86_64-linux-gnu]
OpenSSL: OpenSSL 3.1.4 24 Oct 2023
Install Root: /usr/share/metasploit-framework
Session Type: Connected to msf. Connection type: postgresql.
Install Method: Other - Please specify
@adfoster-r7
Copy link
Contributor

Hi; Have you been following a tutorial or similar? How did you start using armitage

@adfoster-r7
Copy link
Contributor

Should be fixed in the latest release

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Archived in project
Development

No branches or pull requests

2 participants