Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- build.board: msm8996
- build.bootloader: unknown
- build.brand: OnePlus
- build.cpu_abi: arm64-v8a
- build.cpu_abi2:
- build.device: OnePlus3T
- build.display: lineage_oneplus3-userdebug 8.1.0 OPM1.171019.018 5695f92198
- build.fingerprint: OnePlus/OnePlus3/OnePlus3T:8.0.0/OPR6.170623.013/10250816:user/release-keys
- build.hardware: qcom
- build.host: iktinos.acc.umu.se
- build.id: OPM1.171019.018
- build.manufacturer: OnePlus
- build.model: ONEPLUS A3003
- build.product: lineage_oneplus3
- build.radio: MPSS.TH.2.0.c1.9-00102-M8996FAAAANAZM-1.99649.1.118107.1
- build.serial: c6ee831d
- build.tags: release-keys
- build.time: 1519649384000
- build.type: user
- build.user: jenkins
- version.codename: REL
- version.incremental: 5695f92198
- version.release: 8.1.0
- version.sdk_int: 27
- 03-02 10:51:19.399 I/cr_TinDownloadController(30460): Native Download started filename = cSploit-nightly.apk
- 03-02 10:51:37.360 I/Finsky (27656): [2] com.google.android.finsky.verifier.impl.dq.c(146): Verification complete: id=2, package_name=org.csploit.android
- 03-02 10:51:37.444 I/dex2oat (31353): /system/bin/dex2oat --input-vdex-fd=-1 --output-vdex-fd=14 --compiler-filter=quicken --classpath-dir=/data/app/org.csploit.android-tzLMPNzy_WIl85I8SVTaYQ== --class-loader-context=PCL[]
- 03-02 10:51:39.574 V/BackupManagerService(2212): restoreAtInstall pkg=org.csploit.android token=3 restoreSet=0
- 03-02 10:51:39.728 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.google.android.googlequicksearchbox/com.google.android.apps.gsa.googlequicksearchbox.GelStubAppWatcher
- 03-02 10:51:39.729 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.svox.pico/.VoiceDataInstallerReceiver
- 03-02 10:51:39.746 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.aspiro.tidal/com.sprint.ms.smf.ConfigurationReceiver
- 03-02 10:51:39.747 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.sec.android.app.sbrowser/.webcontentsprovider.WebContentsProviderReceiver
- 03-02 10:51:39.753 I/Finsky (27656): [2] com.google.android.finsky.externalreferrer.e.a(52): Package state data is missing for org.csploit.android
- 03-02 10:51:39.771 D/ImsResolver(3231): maybeAddedImsService, packageName: org.csploit.android
- 03-02 10:51:39.807 I/ChromeSync(3830): [Sync,SyncIntentOperation] Handling the intent: Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 cmp=com.google.android.gms/.chimera.GmsIntentOperationService (has extras) }.
- 03-02 10:51:39.810 I/ChromeSync(3830): [Persistence,AffiliationManager] No affiliation data for android://yiBnQeiXRT73LPKnMP8d-gJlp8nQCuglAjaYwjeHB6vPPFBUXT54B4TYHxDsTLFT6zNR7axnlHs0R0fPWUTmRA==@org.csploit.android. Marking affiliation data as stale...
- 03-02 10:51:42.245 I/ActivityManager(2212): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10000000 pkg=org.csploit.android cmp=org.csploit.android/.MainActivity} from uid 10022
- 03-02 10:51:42.299 I/ActivityManager(2212): Start proc 31382:org.csploit.android/u0a159 for activity org.csploit.android/.MainActivity
- 03-02 10:51:42.401 I/chatty (31382): uid=10159(org.csploit.android) expire 21 lines
- 03-02 10:51:42.596 I/chatty (31382): uid=10159(org.csploit.android) expire 17 lines
- 03-02 10:51:42.597 I/chatty (31382): uid=10159(org.csploit.android) expire 9 lines
- 03-02 10:51:42.601 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
- 03-02 10:51:42.607 I/chatty (31382): uid=10159(org.csploit.android) expire 9 lines
- 03-02 10:51:44.666 I/chatty (31382): uid=10159(org.csploit.android) expire 6 lines
- 03-02 10:51:47.437 I/chatty (31382): uid=10159(org.csploit.android) expire 273 lines
- 03-02 10:51:50.031 I/chatty (31382): uid=10159(org.csploit.android) expire 8 lines
- 03-02 10:51:50.344 E/NotificationService(2212): Package enqueue rate is 5.0917697. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
- 03-02 10:51:55.471 E/NotificationService(2212): Package enqueue rate is 5.370362. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
- 03-02 10:51:55.498 I/chatty (31382): uid=10159(org.csploit.android) expire 18 lines
- 03-02 10:51:56.535 W/ActivityManager(2212): Activity pause timeout for ActivityRecord{f722c2d u0 org.csploit.android/.MainActivity t319}
- 03-02 10:52:01.539 I/chatty (31382): uid=10159(org.csploit.android) expire 15 lines
- 03-02 10:52:01.593 I/chatty (31382): uid=10159(org.csploit.android) expire 14 lines
- 03-02 10:52:01.607 I/chatty (31382): uid=10159(org.csploit.android) expire 11 lines
- 03-02 10:52:01.669 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
- 03-02 10:52:03.047 I/chatty (31382): uid=10159(org.csploit.android) expire 315 lines
- 03-02 10:52:05.096 E/NotificationService(2212): Package enqueue rate is 5.2341695. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
- 03-02 10:52:10.138 E/NotificationService(2212): Package enqueue rate is 5.674699. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
- 03-02 10:52:10.346 I/chatty (31382): uid=10159(org.csploit.android) expire 1 line
- 03-02 10:52:12.453 I/chatty (31382): uid=10159(org.csploit.android) expire 15 lines
- 03-02 10:52:25.926 I/ActivityManager(2212): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity (has extras)} from uid 10100
- 03-02 10:52:26.005 I/chatty (31382): uid=10159(org.csploit.android) expire 14 lines
- 03-02 10:52:26.032 I/chatty (31382): uid=10159(org.csploit.android) expire 11 lines
- 03-02 10:52:26.033 I/chatty (31382): uid=10159(org.csploit.android) expire 22 lines
- 03-02 10:52:26.034 I/chatty (31382): uid=10159(org.csploit.android) expire 4 lines
- 03-02 10:52:26.036 I/chatty (31382): uid=10159(org.csploit.android) expire 13 lines
- 03-02 10:52:26.036 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
- 03-02 10:52:28.004 I/chatty (31382): uid=10159(org.csploit.android) expire 27 lines
- 03-02 10:52:28.045 I/chatty (31382): uid=10159(org.csploit.android) expire 1 line
- 03-02 10:52:42.165 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
- 03-02 10:52:57.428 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
- 03-02 10:53:11.663 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
- 03-02 10:53:27.342 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
- 03-02 10:53:39.742 I/chatty (31382): uid=10159(org.csploit.android) expire 14 lines
- 03-02 10:53:54.693 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
- 03-02 10:54:05.511 I/chatty (31382): uid=10159(org.csploit.android) expire 16 lines
- 03-02 10:54:20.544 I/chatty (31382): uid=10159(org.csploit.android) expire 3 lines
- 03-02 10:55:47.653 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
- 03-02 10:55:47.656 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #5 exited ( exitValue=0 )
- 03-02 10:55:47.665 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
- 03-02 10:55:47.666 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #2 exited ( exitValue=0 )
- 03-02 10:56:30.257 I/CSPLOIT[services.UpdateService.downloadFile](31382): download finished successfully
- 03-02 10:56:30.257 I/CSPLOIT[services.UpdateService.verifyArchiveIntegrity](31382): verifying archive integrity
- 03-02 10:56:38.431 I/CSPLOIT[services.UpdateService.extract](31382): extracting '/storage/emulated/0/msf.tar.xz' to '/data/user/0/org.csploit.android/files/msf'
- 03-02 10:56:38.431 D/cSploitClient(31382): parse_cmd: parsing "which env"
- 03-02 10:56:38.431 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=5
- 03-02 10:56:38.431 D/cSploitClient(31382): parse_cmd: argument found: start=6, end=9
- 03-02 10:56:38.436 I/cSploitClient(31382): start_command: child #7 started
- 03-02 10:56:38.436 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='which env' } => 7
- 03-02 10:56:38.451 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
- 03-02 10:56:38.451 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #7 exited ( exitValue=0 )
- 03-02 10:56:45.777 E/NotificationService(2212): Package enqueue rate is 5.030623. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
- 03-02 10:56:55.568 I/CSPLOIT[services.UpdateService.extract](31382): extraction completed
- 03-02 10:56:55.569 I/CSPLOIT[services.UpdateService.extract](31382): .nomedia created
- 03-02 10:56:55.579 E/NotificationService(2212): Package enqueue rate is 5.021186. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
- 03-02 10:56:55.579 D/cSploitClient(31382): parse_cmd: parsing "which bundle"
- 03-02 10:56:55.579 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=5
- 03-02 10:56:55.579 D/cSploitClient(31382): parse_cmd: argument found: start=6, end=12
- 03-02 10:56:55.584 I/cSploitClient(31382): start_command: child #8 started
- 03-02 10:56:55.584 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='which bundle' } => 8
- 03-02 10:56:55.601 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
- 03-02 10:56:55.601 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #8 exited ( exitValue=0 )
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: parsing "bundle install --verbose --local --gemfile '/data/user/0/org.csploit.android/files/msf/Gemfile' --without development test"
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=6
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=7, end=14
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=15, end=24
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=25, end=32
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=33, end=42
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=44, end=94
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=96, end=105
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=106, end=117
- 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=118, end=122
- 03-02 10:56:55.607 I/cSploitClient(31382): start_command: child #9 started
- 03-02 10:56:55.607 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='bundle install --verbose --local --gemfile '/data/user/0/org.csploit.android/files/msf/Gemfile' --without development test' } => 9
- 03-02 10:57:24.774 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
- 03-02 10:57:24.775 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #9 exited ( exitValue=0 )
- 03-02 10:57:24.827 D/CSPLOIT[services.UpdateService.finishNotification](31382): deleting notifications
- 03-02 10:57:24.828 D/CSPLOIT[services.UpdateChecker.run](31382): Service started.
- 03-02 10:57:24.830 D/CSPLOIT[services.UpdateChecker.getApkUpdate](31382): localVersion = 1.7.0-unstable+6686cf1
- 03-02 10:57:24.830 D/CSPLOIT[services.UpdateChecker.getApkUpdate](31382): remoteVersion = 1.6.5
- 03-02 10:57:24.834 W/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): unsupported platform ( android27.armeabi-v7a )
- 03-02 10:57:24.834 D/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): trying with 'android16.armeabi-v7a'
- 03-02 10:57:24.834 D/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): localVersion = 1.0.11
- 03-02 10:57:24.834 D/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): remoteVersion = 1.0.11
- 03-02 10:57:24.836 W/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): unsupported platform ( android27.armeabi-v7a )
- 03-02 10:57:24.836 D/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): trying with 'android16.armeabi-v7a'
- 03-02 10:57:24.836 D/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): localVersion = 1.0.6
- 03-02 10:57:24.836 D/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): remoteVersion = 1.0.6
- 03-02 10:57:24.838 D/CSPLOIT[services.UpdateChecker.run](31382): Service stopped.
- 03-02 10:57:24.843 W/CSPLOIT[services.MsfRpcdService.connect](31382): java.net.ConnectException: Failed to connect to /127.0.0.1:55553
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: parsing "-P 'msf' -U 'msf' -p '55553' -a 127.0.0.1 -n -S -t Msg -f"
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=2
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=4, end=7
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=9, end=11
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=13, end=16
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=18, end=20
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=22, end=27
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=29, end=31
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=32, end=41
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=42, end=44
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=45, end=47
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=48, end=50
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=51, end=54
- 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=55, end=57
- 03-02 10:57:24.846 I/cSploitClient(31382): start_command: child #10 started
- 03-02 10:57:24.846 D/CSPLOIT[core.ChildManager.async](31382): { handler='msfrpcd', cmd='-P 'msf' -U 'msf' -p '55553' -a 127.0.0.1 -n -S -t Msg -f' } => 10
- 03-02 10:57:27.664 W/linker (31782): "/data/data/org.csploit.android/files/ruby/lib/ruby/gems/1.9.1/gems/nokogiri-1.6.0-arm-linux/lib/nokogiri/nokogiri.so" unused DT entry: type 0xf arg 0x12dc5
- 03-02 10:57:35.213 I/ActivityManager(2212): START u0 {cmp=org.csploit.android/.SettingsActivity} from uid 10159
- 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: parsing "du -xsm '/data/user/0/org.csploit.android/files/ruby' '/data/user/0/org.csploit.android/files/msf'"
- 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=2
- 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=3, end=7
- 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=9, end=52
- 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=55, end=97
- 03-02 10:57:35.335 I/cSploitClient(31382): start_command: child #11 started
- 03-02 10:57:35.336 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='du -xsm '/data/user/0/org.csploit.android/files/ruby' '/data/user/0/org.csploit.android/files/msf'' } => 11
- 03-02 10:57:35.338 I/CSPLOIT[net.RemoteReader.run](31382): fetching 'https://api.github.com/repos/cSploit/android.MSF/branches'
- 03-02 10:57:35.500 I/ActivityManager(2212): Displayed org.csploit.android/.SettingsActivity: +236ms
- 03-02 10:57:35.525 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
- 03-02 10:57:35.525 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #11 exited ( exitValue=0 )
- 03-02 10:58:30.586 I/ActivityManager(2212): START u0 {act=android.settings.APPLICATION_DETAILS_SETTINGS dat=package:org.csploit.android flg=0x10008000 cmp=com.android.settings/.applications.InstalledAppDetails bnds=[268,1071][846,1218]} from uid 1000
- 03-02 10:58:31.324 V/BatteryUtils(28937): package: org.csploit.android
- 03-02 10:58:33.101 D/InstalledAppDetails(28937): Stopping package org.csploit.android
- 03-02 10:58:33.102 I/ActivityManager(2212): Force stopping org.csploit.android appid=10159 user=0: from pid 28937
- 03-02 10:58:33.102 I/ActivityManager(2212): Killing 31382:org.csploit.android/u0a159 (adj 900): stop org.csploit.android
- 03-02 10:58:33.121 I/ActivityManager(2212): Force finishing activity ActivityRecord{344d7e0 u0 org.csploit.android/.MainActivity t321}
- 03-02 10:58:33.140 D/InstalledAppDetails(28937): Sending broadcast to query restart status for org.csploit.android
- 03-02 10:58:33.191 D/InstalledAppDetails(28937): Sending broadcast to query restart status for org.csploit.android
- 03-02 10:58:33.227 D/InstalledAppDetails(28937): Got broadcast response: Restart status for org.csploit.android false
- 03-02 10:58:33.266 D/InstalledAppDetails(28937): Got broadcast response: Restart status for org.csploit.android false
- 03-02 10:58:50.902 I/ActivityManager(2212): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity (has extras)} from uid 10100
- 03-02 10:58:50.950 I/ActivityManager(2212): Start proc 32069:org.csploit.android/u0a159 for activity org.csploit.android/.MainActivity
- 03-02 10:58:51.098 I/ACRA (32069): ACRA is enabled for org.csploit.android, initializing...
- 03-02 10:58:51.118 D/CSPLOIT[core.System.init](32069): initializing System...
- 03-02 10:58:51.131 E/CSPLOIT[core.System.errorLogging](32069): Neither user 10159 nor current process has android.permission.WAKE_LOCK.
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): java.lang.SecurityException: Neither user 10159 nor current process has android.permission.WAKE_LOCK.
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Parcel.readException(Parcel.java:2004)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Parcel.readException(Parcel.java:1950)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.net.wifi.IWifiManager$Stub$Proxy.acquireWifiLock(IWifiManager.java:1455)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.net.wifi.WifiManager$WifiLock.acquire(WifiManager.java:3043)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at org.csploit.android.core.System.init(System.java:171)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at org.csploit.android.CSploitApplication.onCreate(CSploitApplication.java:83)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.Instrumentation.callApplicationOnCreate(Instrumentation.java:1119)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread.handleBindApplication(ActivityThread.java:5740)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread.-wrap1(Unknown Source:0)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1656)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Handler.dispatchMessage(Handler.java:106)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Looper.loop(Looper.java:164)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread.main(ActivityThread.java:6494)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at java.lang.reflect.Method.invoke(Native Method)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:440)
- 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:807)
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=6, have_stdin=0, have_stdout=1, name="tcpdump"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=1, have_stdin=1, have_stdout=1, name="raw"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=2, have_stdin=0, have_stdout=1, name="nmap"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=8, have_stdin=0, have_stdout=1, name="network-radar"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=9, have_stdin=0, have_stdout=1, name="msfrpcd"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=4, have_stdin=0, have_stdout=1, name="hydra"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=7, have_stdin=0, have_stdout=1, name="fusemounts"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=3, have_stdin=0, have_stdout=1, name="ettercap"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=0, have_stdin=0, have_stdout=0, name="blind"
- 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=5, have_stdin=0, have_stdout=1, name="arpspoof"
- 03-02 10:58:51.246 I/CSPLOIT[services.NetworkRadar.onAutoScanChanged](32069): autoScan has been set to true
- 03-02 10:58:51.247 E/AndroidRuntime(32069): Process: org.csploit.android, PID: 32069
- 03-02 10:58:51.247 E/AndroidRuntime(32069): java.lang.RuntimeException: Unable to start activity ComponentInfo{org.csploit.android/org.csploit.android.MainActivity}: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
- 03-02 10:58:51.247 E/AndroidRuntime(32069): Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
- 03-02 10:58:51.247 E/AndroidRuntime(32069): at org.csploit.android.core.System.initCore(System.java:356)
- 03-02 10:58:51.247 E/AndroidRuntime(32069): at org.csploit.android.MainFragment.init(MainFragment.java:287)
- 03-02 10:58:51.247 E/AndroidRuntime(32069): at org.csploit.android.MainFragment.onViewCreated(MainFragment.java:249)
- 03-02 10:58:51.247 E/ACRA (32069): ACRA caught a RuntimeException for org.csploit.android
- 03-02 10:58:51.247 E/ACRA (32069): java.lang.RuntimeException: Unable to start activity ComponentInfo{org.csploit.android/org.csploit.android.MainActivity}: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
- 03-02 10:58:51.247 E/ACRA (32069): Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
- 03-02 10:58:51.247 E/ACRA (32069): at org.csploit.android.core.System.initCore(System.java:356)
- 03-02 10:58:51.247 E/ACRA (32069): at org.csploit.android.MainFragment.init(MainFragment.java:287)
- 03-02 10:58:51.247 E/ACRA (32069): at org.csploit.android.MainFragment.onViewCreated(MainFragment.java:249)
- 03-02 10:58:51.355 I/ActivityManager(2212): Process org.csploit.android (pid 32069) has died: fore TOP
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement