We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The following global/module datastore, and database setup was configured before the issue occurred:
[framework/core] LHOST= LPORT= loglevel=3 [framework/ui/console] ActiveModule=exploit/unix/ftp/vsftpd_234_backdoor [unix/ftp/vsftpd_234_backdoor] RHOSTS= TARGET= LHOST= LPORT= PAYLOAD=cmd/unix/interact RPORT= WORKSPACE= VERBOSE=false WfsDelay=2 EnableContextEncoding=false ContextInformationFile= DisablePayloadHandler=false SSL=false SSLServerNameIndication= SSLVersion=Auto SSLVerifyMode=PEER SSLCipher= Proxies= CPORT= CHOST= ConnectTimeout=10 TCP::max_send_size=0 TCP::send_delay=0
The database contains the following information:
Session Type: Connected to msf. Connection type: postgresql.
The following commands were ran during the session and before this issue occurred:
The following framework errors occurred before the issue occurred:
[04/02/2024 06:31:05] [e(0)] core: Failed to connect to the database: connection to server at "::1", port 5432 failed: Connection refused Is the server running on that host and accepting TCP/IP connections? connection to server at "127.0.0.1", port 5432 failed: Connection refused Is the server running on that host and accepting TCP/IP connections? [04/02/2024 06:32:32] [e(0)] core: Thread Exception: WebConsoleShell critical=false source: /usr/share/metasploit-framework/lib/msf/ui/web/web_console.rb:84:in `initialize' /usr/share/metasploit-framework/lib/msf/ui/web/driver.rb:62:in `new' /usr/share/metasploit-framework/lib/msf/ui/web/driver.rb:62:in `create_console' /usr/share/metasploit-framework/lib/msf/core/rpc/v10/rpc_console.rb:28:in `rpc_create' /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:143:in `block in process' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:186:in `block in timeout' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:41:in `handle_timeout' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/timeout-0.4.1/lib/timeout.rb:195:in `timeout' /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:143:in `process' /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:81:in `on_request_uri' /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:62:in `block in start' /usr/share/metasploit-framework/lib/rex/proto/http/handler/proc.rb:38:in `on_request' /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:316:in `dispatch_request' /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:250:in `on_client_data' /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:109:in `block in start' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:42:in `on_client_data' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:185:in `block in monitor_clients' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:184:in `each' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:184:in `monitor_clients' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/rex-core-0.1.31/lib/rex/io/stream_server.rb:64:in `block in start' /usr/share/metasploit-framework/lib/rex/thread_factory.rb:22:in `block in spawn' /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:105:in `block in spawn' - ThreadError can't alloc thread [04/02/2024 06:41:17] [e(0)] core: /usr/share/metasploit-framework/modules/exploits/linux/smtp/haraka.py failed to load - SyntaxError /usr/share/metasploit-framework/modules/exploits/linux/smtp/haraka.py:23: syntax error, unexpected ':', expecting end-of-input [04/02/2024 06:42:22] [e(0)] core: Exploit failed (unix/ftp/proftpd_133c_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b8459a70 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b8459a70 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8454ac0 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8454a48 @lsock=#<TCPSocket:fd 16, AF_INET, 127.0.0.1, 44575>, @rsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 51224>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/proftpd_133c_backdoor) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8454ac0 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8454a48 @lsock=#<TCPSocket:fd 16, AF_INET, 127.0.0.1, 44575>, @rsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 51224>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8454bb0 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/proftpd_133c_backdoor) > "> Did you mean? prompting? prompt prompt= [04/02/2024 06:42:45] [e(0)] core: Exploit failed (unix/ftp/proftpd_133c_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bbaf1448 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bbaf1448 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bbb5a290 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bbb5a1f0 @lsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 44481>, @rsock=#<TCPSocket:fd 11, AF_INET, 127.0.0.1, 55690>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/proftpd_133c_backdoor) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bbb5a290 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bbb5a1f0 @lsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 44481>, @rsock=#<TCPSocket:fd 11, AF_INET, 127.0.0.1, 55690>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bbb54ae8 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/proftpd_133c_backdoor) > "> Did you mean? prompting? prompt prompt= [04/02/2024 06:43:08] [e(0)] core: Exploit failed (multi/ftp/pureftpd_bash_env_exec) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993960c50 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993960c50 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff993963fb8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff993963f18 @lsock=#<TCPSocket:fd 28, AF_INET, 127.0.0.1, 44619>, @rsock=#<TCPSocket:fd 27, AF_INET, 127.0.0.1, 42218>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 ...>, @input=nil, @prompt=\"msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff993963fb8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff993963f18 @lsock=#<TCPSocket:fd 28, AF_INET, 127.0.0.1, 44619>, @rsock=#<TCPSocket:fd 27, AF_INET, 127.0.0.1, 42218>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff99395c0d8 ...>, @input=nil, @prompt="msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > "> Did you mean? prompting? prompt prompt= [04/02/2024 06:43:41] [e(0)] core: Exploit failed (multi/ftp/pureftpd_bash_env_exec) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b86312a8 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9b86312a8 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8626178 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8625e08 @lsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 36219>, @rsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 39448>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 ...>, @input=nil, @prompt=\"msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9b8626178 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9b8625e08 @lsock=#<TCPSocket:fd 15, AF_INET, 127.0.0.1, 36219>, @rsock=#<TCPSocket:fd 13, AF_INET, 127.0.0.1, 39448>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9b8626420 ...>, @input=nil, @prompt="msf6 exploit(multi/ftp/pureftpd_bash_env_exec) > "> Did you mean? prompting? prompt prompt= [04/02/2024 06:46:26] [e(0)] core: Exploit failed (unix/ftp/proftpd_133c_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bb14ab38 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9bb14ab38 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bb145e30 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bb145de0 @lsock=#<TCPSocket:fd 34, AF_INET, 127.0.0.1, 41995>, @rsock=#<TCPSocket:fd 32, AF_INET, 127.0.0.1, 53374>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/proftpd_133c_backdoor) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9bb145e30 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9bb145de0 @lsock=#<TCPSocket:fd 34, AF_INET, 127.0.0.1, 41995>, @rsock=#<TCPSocket:fd 32, AF_INET, 127.0.0.1, 53374>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9bb145f48 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/proftpd_133c_backdoor) > "> Did you mean? prompting? prompt prompt= [04/02/2024 06:49:24] [e(0)] core: Exploit failed (unix/ftp/vsftpd_234_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993171210 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff993171210 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9931ce1b8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9931ce118 @lsock=#<TCPSocket:fd 30, AF_INET, 127.0.0.1, 40521>, @rsock=#<TCPSocket:fd 29, AF_INET, 127.0.0.1, 47996>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/vsftpd_234_backdoor) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9931ce1b8 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9931ce118 @lsock=#<TCPSocket:fd 30, AF_INET, 127.0.0.1, 40521>, @rsock=#<TCPSocket:fd 29, AF_INET, 127.0.0.1, 47996>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9931ce488 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/vsftpd_234_backdoor) > "> Did you mean? prompting? prompt prompt= Call stack: /usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `ensure in without_prompt' /usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `without_prompt' /usr/share/metasploit-framework/lib/msf/core/module/alert.rb:245:in `alert_user' /usr/share/metasploit-framework/lib/msf/core/module/ui.rb:21:in `init_ui' /usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:71:in `exploit_simple' /usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:172:in `exploit_simple' /usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:45:in `exploit_single' /usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:188:in `cmd_exploit' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:581:in `run_command' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:530:in `block in run_single' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `each' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `run_single' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:165:in `block in run' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:309:in `block in with_history_manager_context' /usr/share/metasploit-framework/lib/rex/ui/text/shell/history_manager.rb:35:in `with_context' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:306:in `with_history_manager_context' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:133:in `run' /usr/share/metasploit-framework/lib/msf/ui/web/web_console.rb:84:in `block in initialize' /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:105:in `block in spawn' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/logging-2.3.1/lib/logging/diagnostic_context.rb:474:in `block in create_with_logging_context' [04/02/2024 06:50:10] [e(0)] core: Exploit failed (unix/ftp/vsftpd_234_backdoor) - NoMethodError undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 @subscribers_out={"msfweb"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9c9002060 @buf="[-] 49.36.202.145:21 - Exploit failed: undefined method `prompting' for #<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 @subscribers_out={\"msfweb\"=>#<Rex::Ui::Text::Output::Buffer:0x00007ff9c9002060 @buf=\"\">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9c8fe0f78 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9c8fe0ed8 @lsock=#<TCPSocket:fd 18, AF_INET, 127.0.0.1, 46321>, @rsock=#<TCPSocket:fd 17, AF_INET, 127.0.0.1, 33818>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 ...>, @input=nil, @prompt=\"msf6 exploit(unix/ftp/vsftpd_234_backdoor) > \">\nDid you mean? prompting?\n prompt\n prompt=\n">}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=#<Rex::Ui::Text::Input::Buffer:0x00007ff9c8fe0f78 @sock=#<Rex::Ui::Text::Input::Buffer::BufferSock:0x00007ff9c8fe0ed8 @lsock=#<TCPSocket:fd 18, AF_INET, 127.0.0.1, 46321>, @rsock=#<TCPSocket:fd 17, AF_INET, 127.0.0.1, 33818>>>, @output=#<Msf::Ui::Web::WebConsole::WebConsolePipe:0x00007ff9c8fe1090 ...>, @input=nil, @prompt="msf6 exploit(unix/ftp/vsftpd_234_backdoor) > "> Did you mean? prompting? prompt prompt= Call stack: /usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `ensure in without_prompt' /usr/share/metasploit-framework/lib/msf/core/module/alert.rb:280:in `without_prompt' /usr/share/metasploit-framework/lib/msf/core/module/alert.rb:245:in `alert_user' /usr/share/metasploit-framework/lib/msf/core/module/ui.rb:21:in `init_ui' /usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:71:in `exploit_simple' /usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:172:in `exploit_simple' /usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:45:in `exploit_single' /usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:188:in `cmd_exploit' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:581:in `run_command' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:530:in `block in run_single' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `each' /usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:524:in `run_single' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:165:in `block in run' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:309:in `block in with_history_manager_context' /usr/share/metasploit-framework/lib/rex/ui/text/shell/history_manager.rb:35:in `with_context' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:306:in `with_history_manager_context' /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:133:in `run' /usr/share/metasploit-framework/lib/msf/ui/web/web_console.rb:84:in `block in initialize' /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:105:in `block in spawn' /usr/share/metasploit-framework/vendor/bundle/ruby/3.1.0/gems/logging-2.3.1/lib/logging/diagnostic_context.rb:474:in `block in create_with_logging_context'
The following web service errors occurred before the issue occurred:
msf-ws.log does not exist.
The following framework logs were recorded before the issue occurred:
[04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsbe/reverse_tcp and stage linux/mipsle/meterpreter have incompatible architectures: mipsbe - mipsle [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage bsd/x86/shell have incompatible platforms: ["Linux"] - ["BSD"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage bsdi/x86/shell have incompatible platforms: ["Linux"] - ["BSDi"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage android/shell have incompatible platforms: ["Linux"] - ["Android"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage android/meterpreter have incompatible platforms: ["Linux"] - ["Android"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage netware/shell have incompatible platforms: ["Linux"] - ["Netware"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage php/meterpreter have incompatible platforms: ["Linux"] - ["PHP"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/patchupdllinject have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/upexec have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/patchupmeterpreter have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/custom have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/custom have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/shell have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/meterpreter have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/peinject have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/x64/vncinject have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/shell have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/meterpreter have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/peinject have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/dllinject have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage windows/vncinject have incompatible platforms: ["Linux"] - ["Windows"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage java/shell have incompatible platforms: ["Linux"] - ["Java"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage java/meterpreter have incompatible platforms: ["Linux"] - ["Java"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage multi/meterpreter have incompatible platforms: ["Linux"] - ["Multi"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/aarch64/meterpreter have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/armle/execute have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/armle/shell have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x86/bundleinject have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x86/isight have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x86/vforkshell have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x64/dupandexecve have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/x64/meterpreter have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage osx/ppc/shell have incompatible platforms: ["Linux"] - ["OSX"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage python/meterpreter have incompatible platforms: ["Linux"] - ["Python"] [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/aarch64/shell have incompatible architectures: mipsle - aarch64 [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/aarch64/meterpreter have incompatible architectures: mipsle - aarch64 [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/armle/shell have incompatible architectures: mipsle - armle [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/armle/meterpreter have incompatible architectures: mipsle - armle [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x86/shell have incompatible architectures: mipsle - x86 [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x86/meterpreter have incompatible architectures: mipsle - x86 [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x64/shell have incompatible architectures: mipsle - x64 [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/x64/meterpreter have incompatible architectures: mipsle - x64 [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/mipsbe/shell have incompatible architectures: mipsle - mipsbe [04/02/2024 06:50:21] [d(2)] core: Stager linux/mipsle/reverse_tcp and stage linux/mipsbe/meterpreter have incompatible architectures: mipsle - mipsbe [04/02/2024 06:50:21] [d(1)] core: Module is compatible with [04/02/2024 06:50:21] [d(1)] core: Module is compatible with [04/02/2024 06:50:21] [d(2)] core: Built staged payload linux/mipsle/shell/reverse_tcp. [04/02/2024 06:50:21] [d(1)] core: Module is compatible with [04/02/2024 06:50:21] [d(1)] core: Module is compatible with [04/02/2024 06:50:21] [d(2)] core: Built staged payload linux/mipsle/meterpreter/reverse_tcp.
The following web service logs were recorded before the issue occurred:
The versions and install method of your Metasploit setup:
Framework: 6.3.55-dev Ruby: ruby 3.1.2p20 (2022-04-12 revision 4491bb740a) [x86_64-linux-gnu] OpenSSL: OpenSSL 3.1.4 24 Oct 2023 Install Root: /usr/share/metasploit-framework Session Type: Connected to msf. Connection type: postgresql. Install Method: Other - Please specify
The text was updated successfully, but these errors were encountered:
Hi; Have you been following a tutorial or similar? How did you start using armitage
Sorry, something went wrong.
Should be fixed in the latest release
No branches or pull requests
Module/Datastore
The following global/module datastore, and database setup was configured before the issue occurred:
Collapse
Database Configuration
The database contains the following information:
Collapse
History
The following commands were ran during the session and before this issue occurred:
Collapse
Framework Errors
The following framework errors occurred before the issue occurred:
Collapse
Web Service Errors
The following web service errors occurred before the issue occurred:
Collapse
Framework Logs
The following framework logs were recorded before the issue occurred:
Collapse
Web Service Logs
The following web service logs were recorded before the issue occurred:
Collapse
Version/Install
The versions and install method of your Metasploit setup:
Collapse
The text was updated successfully, but these errors were encountered: