Advertisement
Guest User

Crash

a guest
Mar 2nd, 2018
202
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.69 KB | None | 0 0
  1. build.board: msm8996
  2. build.bootloader: unknown
  3. build.brand: OnePlus
  4. build.cpu_abi: arm64-v8a
  5. build.cpu_abi2:
  6. build.device: OnePlus3T
  7. build.display: lineage_oneplus3-userdebug 8.1.0 OPM1.171019.018 5695f92198
  8. build.fingerprint: OnePlus/OnePlus3/OnePlus3T:8.0.0/OPR6.170623.013/10250816:user/release-keys
  9. build.hardware: qcom
  10. build.host: iktinos.acc.umu.se
  11. build.id: OPM1.171019.018
  12. build.manufacturer: OnePlus
  13. build.model: ONEPLUS A3003
  14. build.product: lineage_oneplus3
  15. build.radio: MPSS.TH.2.0.c1.9-00102-M8996FAAAANAZM-1.99649.1.118107.1
  16. build.serial: c6ee831d
  17. build.tags: release-keys
  18. build.time: 1519649384000
  19. build.type: user
  20. build.user: jenkins
  21. version.codename: REL
  22. version.incremental: 5695f92198
  23. version.release: 8.1.0
  24. version.sdk_int: 27
  25.  
  26. 03-02 10:51:19.399 I/cr_TinDownloadController(30460): Native Download started filename = cSploit-nightly.apk
  27. 03-02 10:51:37.360 I/Finsky (27656): [2] com.google.android.finsky.verifier.impl.dq.c(146): Verification complete: id=2, package_name=org.csploit.android
  28. 03-02 10:51:37.444 I/dex2oat (31353): /system/bin/dex2oat --input-vdex-fd=-1 --output-vdex-fd=14 --compiler-filter=quicken --classpath-dir=/data/app/org.csploit.android-tzLMPNzy_WIl85I8SVTaYQ== --class-loader-context=PCL[]
  29. 03-02 10:51:39.574 V/BackupManagerService(2212): restoreAtInstall pkg=org.csploit.android token=3 restoreSet=0
  30. 03-02 10:51:39.728 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.google.android.googlequicksearchbox/com.google.android.apps.gsa.googlequicksearchbox.GelStubAppWatcher
  31. 03-02 10:51:39.729 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.svox.pico/.VoiceDataInstallerReceiver
  32. 03-02 10:51:39.746 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.aspiro.tidal/com.sprint.ms.smf.ConfigurationReceiver
  33. 03-02 10:51:39.747 W/BroadcastQueue(2212): Background execution not allowed: receiving Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 (has extras) } to com.sec.android.app.sbrowser/.webcontentsprovider.WebContentsProviderReceiver
  34. 03-02 10:51:39.753 I/Finsky (27656): [2] com.google.android.finsky.externalreferrer.e.a(52): Package state data is missing for org.csploit.android
  35. 03-02 10:51:39.771 D/ImsResolver(3231): maybeAddedImsService, packageName: org.csploit.android
  36. 03-02 10:51:39.807 I/ChromeSync(3830): [Sync,SyncIntentOperation] Handling the intent: Intent { act=android.intent.action.PACKAGE_ADDED dat=package:org.csploit.android flg=0x4000010 cmp=com.google.android.gms/.chimera.GmsIntentOperationService (has extras) }.
  37. 03-02 10:51:39.810 I/ChromeSync(3830): [Persistence,AffiliationManager] No affiliation data for android://yiBnQeiXRT73LPKnMP8d-gJlp8nQCuglAjaYwjeHB6vPPFBUXT54B4TYHxDsTLFT6zNR7axnlHs0R0fPWUTmRA==@org.csploit.android. Marking affiliation data as stale...
  38. 03-02 10:51:42.245 I/ActivityManager(2212): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10000000 pkg=org.csploit.android cmp=org.csploit.android/.MainActivity} from uid 10022
  39. 03-02 10:51:42.299 I/ActivityManager(2212): Start proc 31382:org.csploit.android/u0a159 for activity org.csploit.android/.MainActivity
  40. 03-02 10:51:42.401 I/chatty (31382): uid=10159(org.csploit.android) expire 21 lines
  41. 03-02 10:51:42.596 I/chatty (31382): uid=10159(org.csploit.android) expire 17 lines
  42. 03-02 10:51:42.597 I/chatty (31382): uid=10159(org.csploit.android) expire 9 lines
  43. 03-02 10:51:42.601 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
  44. 03-02 10:51:42.607 I/chatty (31382): uid=10159(org.csploit.android) expire 9 lines
  45. 03-02 10:51:44.666 I/chatty (31382): uid=10159(org.csploit.android) expire 6 lines
  46. 03-02 10:51:47.437 I/chatty (31382): uid=10159(org.csploit.android) expire 273 lines
  47. 03-02 10:51:50.031 I/chatty (31382): uid=10159(org.csploit.android) expire 8 lines
  48. 03-02 10:51:50.344 E/NotificationService(2212): Package enqueue rate is 5.0917697. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
  49. 03-02 10:51:55.471 E/NotificationService(2212): Package enqueue rate is 5.370362. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
  50. 03-02 10:51:55.498 I/chatty (31382): uid=10159(org.csploit.android) expire 18 lines
  51. 03-02 10:51:56.535 W/ActivityManager(2212): Activity pause timeout for ActivityRecord{f722c2d u0 org.csploit.android/.MainActivity t319}
  52. 03-02 10:52:01.539 I/chatty (31382): uid=10159(org.csploit.android) expire 15 lines
  53. 03-02 10:52:01.593 I/chatty (31382): uid=10159(org.csploit.android) expire 14 lines
  54. 03-02 10:52:01.607 I/chatty (31382): uid=10159(org.csploit.android) expire 11 lines
  55. 03-02 10:52:01.669 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
  56. 03-02 10:52:03.047 I/chatty (31382): uid=10159(org.csploit.android) expire 315 lines
  57. 03-02 10:52:05.096 E/NotificationService(2212): Package enqueue rate is 5.2341695. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
  58. 03-02 10:52:10.138 E/NotificationService(2212): Package enqueue rate is 5.674699. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
  59. 03-02 10:52:10.346 I/chatty (31382): uid=10159(org.csploit.android) expire 1 line
  60. 03-02 10:52:12.453 I/chatty (31382): uid=10159(org.csploit.android) expire 15 lines
  61. 03-02 10:52:25.926 I/ActivityManager(2212): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity (has extras)} from uid 10100
  62. 03-02 10:52:26.005 I/chatty (31382): uid=10159(org.csploit.android) expire 14 lines
  63. 03-02 10:52:26.032 I/chatty (31382): uid=10159(org.csploit.android) expire 11 lines
  64. 03-02 10:52:26.033 I/chatty (31382): uid=10159(org.csploit.android) expire 22 lines
  65. 03-02 10:52:26.034 I/chatty (31382): uid=10159(org.csploit.android) expire 4 lines
  66. 03-02 10:52:26.036 I/chatty (31382): uid=10159(org.csploit.android) expire 13 lines
  67. 03-02 10:52:26.036 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
  68. 03-02 10:52:28.004 I/chatty (31382): uid=10159(org.csploit.android) expire 27 lines
  69. 03-02 10:52:28.045 I/chatty (31382): uid=10159(org.csploit.android) expire 1 line
  70. 03-02 10:52:42.165 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
  71. 03-02 10:52:57.428 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
  72. 03-02 10:53:11.663 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
  73. 03-02 10:53:27.342 I/chatty (31382): uid=10159(org.csploit.android) expire 12 lines
  74. 03-02 10:53:39.742 I/chatty (31382): uid=10159(org.csploit.android) expire 14 lines
  75. 03-02 10:53:54.693 I/chatty (31382): uid=10159(org.csploit.android) expire 10 lines
  76. 03-02 10:54:05.511 I/chatty (31382): uid=10159(org.csploit.android) expire 16 lines
  77. 03-02 10:54:20.544 I/chatty (31382): uid=10159(org.csploit.android) expire 3 lines
  78. 03-02 10:55:47.653 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
  79. 03-02 10:55:47.656 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #5 exited ( exitValue=0 )
  80. 03-02 10:55:47.665 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
  81. 03-02 10:55:47.666 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #2 exited ( exitValue=0 )
  82. 03-02 10:56:30.257 I/CSPLOIT[services.UpdateService.downloadFile](31382): download finished successfully
  83. 03-02 10:56:30.257 I/CSPLOIT[services.UpdateService.verifyArchiveIntegrity](31382): verifying archive integrity
  84. 03-02 10:56:38.431 I/CSPLOIT[services.UpdateService.extract](31382): extracting '/storage/emulated/0/msf.tar.xz' to '/data/user/0/org.csploit.android/files/msf'
  85. 03-02 10:56:38.431 D/cSploitClient(31382): parse_cmd: parsing "which env"
  86. 03-02 10:56:38.431 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=5
  87. 03-02 10:56:38.431 D/cSploitClient(31382): parse_cmd: argument found: start=6, end=9
  88. 03-02 10:56:38.436 I/cSploitClient(31382): start_command: child #7 started
  89. 03-02 10:56:38.436 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='which env' } => 7
  90. 03-02 10:56:38.451 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
  91. 03-02 10:56:38.451 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #7 exited ( exitValue=0 )
  92. 03-02 10:56:45.777 E/NotificationService(2212): Package enqueue rate is 5.030623. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
  93. 03-02 10:56:55.568 I/CSPLOIT[services.UpdateService.extract](31382): extraction completed
  94. 03-02 10:56:55.569 I/CSPLOIT[services.UpdateService.extract](31382): .nomedia created
  95. 03-02 10:56:55.579 E/NotificationService(2212): Package enqueue rate is 5.021186. Shedding 0|org.csploit.android|1|null|10159. package=org.csploit.android
  96. 03-02 10:56:55.579 D/cSploitClient(31382): parse_cmd: parsing "which bundle"
  97. 03-02 10:56:55.579 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=5
  98. 03-02 10:56:55.579 D/cSploitClient(31382): parse_cmd: argument found: start=6, end=12
  99. 03-02 10:56:55.584 I/cSploitClient(31382): start_command: child #8 started
  100. 03-02 10:56:55.584 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='which bundle' } => 8
  101. 03-02 10:56:55.601 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
  102. 03-02 10:56:55.601 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #8 exited ( exitValue=0 )
  103. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: parsing "bundle install --verbose --local --gemfile '/data/user/0/org.csploit.android/files/msf/Gemfile' --without development test"
  104. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=6
  105. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=7, end=14
  106. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=15, end=24
  107. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=25, end=32
  108. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=33, end=42
  109. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=44, end=94
  110. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=96, end=105
  111. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=106, end=117
  112. 03-02 10:56:55.603 D/cSploitClient(31382): parse_cmd: argument found: start=118, end=122
  113. 03-02 10:56:55.607 I/cSploitClient(31382): start_command: child #9 started
  114. 03-02 10:56:55.607 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='bundle install --verbose --local --gemfile '/data/user/0/org.csploit.android/files/msf/Gemfile' --without development test' } => 9
  115. 03-02 10:57:24.774 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
  116. 03-02 10:57:24.775 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #9 exited ( exitValue=0 )
  117. 03-02 10:57:24.827 D/CSPLOIT[services.UpdateService.finishNotification](31382): deleting notifications
  118. 03-02 10:57:24.828 D/CSPLOIT[services.UpdateChecker.run](31382): Service started.
  119. 03-02 10:57:24.830 D/CSPLOIT[services.UpdateChecker.getApkUpdate](31382): localVersion = 1.7.0-unstable+6686cf1
  120. 03-02 10:57:24.830 D/CSPLOIT[services.UpdateChecker.getApkUpdate](31382): remoteVersion = 1.6.5
  121. 03-02 10:57:24.834 W/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): unsupported platform ( android27.armeabi-v7a )
  122. 03-02 10:57:24.834 D/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): trying with 'android16.armeabi-v7a'
  123. 03-02 10:57:24.834 D/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): localVersion = 1.0.11
  124. 03-02 10:57:24.834 D/CSPLOIT[services.UpdateChecker.getCoreUpdate](31382): remoteVersion = 1.0.11
  125. 03-02 10:57:24.836 W/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): unsupported platform ( android27.armeabi-v7a )
  126. 03-02 10:57:24.836 D/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): trying with 'android16.armeabi-v7a'
  127. 03-02 10:57:24.836 D/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): localVersion = 1.0.6
  128. 03-02 10:57:24.836 D/CSPLOIT[services.UpdateChecker.getRubyUpdate](31382): remoteVersion = 1.0.6
  129. 03-02 10:57:24.838 D/CSPLOIT[services.UpdateChecker.run](31382): Service stopped.
  130. 03-02 10:57:24.843 W/CSPLOIT[services.MsfRpcdService.connect](31382): java.net.ConnectException: Failed to connect to /127.0.0.1:55553
  131. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: parsing "-P 'msf' -U 'msf' -p '55553' -a 127.0.0.1 -n -S -t Msg -f"
  132. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=2
  133. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=4, end=7
  134. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=9, end=11
  135. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=13, end=16
  136. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=18, end=20
  137. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=22, end=27
  138. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=29, end=31
  139. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=32, end=41
  140. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=42, end=44
  141. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=45, end=47
  142. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=48, end=50
  143. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=51, end=54
  144. 03-02 10:57:24.843 D/cSploitClient(31382): parse_cmd: argument found: start=55, end=57
  145. 03-02 10:57:24.846 I/cSploitClient(31382): start_command: child #10 started
  146. 03-02 10:57:24.846 D/CSPLOIT[core.ChildManager.async](31382): { handler='msfrpcd', cmd='-P 'msf' -U 'msf' -p '55553' -a 127.0.0.1 -n -S -t Msg -f' } => 10
  147. 03-02 10:57:27.664 W/linker (31782): "/data/data/org.csploit.android/files/ruby/lib/ruby/gems/1.9.1/gems/nokogiri-1.6.0-arm-linux/lib/nokogiri/nokogiri.so" unused DT entry: type 0xf arg 0x12dc5
  148. 03-02 10:57:35.213 I/ActivityManager(2212): START u0 {cmp=org.csploit.android/.SettingsActivity} from uid 10159
  149. 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: parsing "du -xsm '/data/user/0/org.csploit.android/files/ruby' '/data/user/0/org.csploit.android/files/msf'"
  150. 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=0, end=2
  151. 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=3, end=7
  152. 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=9, end=52
  153. 03-02 10:57:35.333 D/cSploitClient(31382): parse_cmd: argument found: start=55, end=97
  154. 03-02 10:57:35.335 I/cSploitClient(31382): start_command: child #11 started
  155. 03-02 10:57:35.336 D/CSPLOIT[core.ChildManager.async](31382): { handler='raw', cmd='du -xsm '/data/user/0/org.csploit.android/files/ruby' '/data/user/0/org.csploit.android/files/msf'' } => 11
  156. 03-02 10:57:35.338 I/CSPLOIT[net.RemoteReader.run](31382): fetching 'https://api.github.com/repos/cSploit/android.MSF/branches'
  157. 03-02 10:57:35.500 I/ActivityManager(2212): Displayed org.csploit.android/.SettingsActivity: +236ms
  158. 03-02 10:57:35.525 D/CSPLOIT[core.ChildManager.onEvent](31382): received an event: ChildEnd: { exit_status=0 }
  159. 03-02 10:57:35.525 D/CSPLOIT[core.ChildManager.dispatchEvent](31382): Child #11 exited ( exitValue=0 )
  160. 03-02 10:58:30.586 I/ActivityManager(2212): START u0 {act=android.settings.APPLICATION_DETAILS_SETTINGS dat=package:org.csploit.android flg=0x10008000 cmp=com.android.settings/.applications.InstalledAppDetails bnds=[268,1071][846,1218]} from uid 1000
  161. 03-02 10:58:31.324 V/BatteryUtils(28937): package: org.csploit.android
  162. 03-02 10:58:33.101 D/InstalledAppDetails(28937): Stopping package org.csploit.android
  163. 03-02 10:58:33.102 I/ActivityManager(2212): Force stopping org.csploit.android appid=10159 user=0: from pid 28937
  164. 03-02 10:58:33.102 I/ActivityManager(2212): Killing 31382:org.csploit.android/u0a159 (adj 900): stop org.csploit.android
  165. 03-02 10:58:33.121 I/ActivityManager(2212): Force finishing activity ActivityRecord{344d7e0 u0 org.csploit.android/.MainActivity t321}
  166. 03-02 10:58:33.140 D/InstalledAppDetails(28937): Sending broadcast to query restart status for org.csploit.android
  167. 03-02 10:58:33.191 D/InstalledAppDetails(28937): Sending broadcast to query restart status for org.csploit.android
  168. 03-02 10:58:33.227 D/InstalledAppDetails(28937): Got broadcast response: Restart status for org.csploit.android false
  169. 03-02 10:58:33.266 D/InstalledAppDetails(28937): Got broadcast response: Restart status for org.csploit.android false
  170. 03-02 10:58:50.902 I/ActivityManager(2212): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity (has extras)} from uid 10100
  171. 03-02 10:58:50.950 I/ActivityManager(2212): Start proc 32069:org.csploit.android/u0a159 for activity org.csploit.android/.MainActivity
  172. 03-02 10:58:51.098 I/ACRA (32069): ACRA is enabled for org.csploit.android, initializing...
  173. 03-02 10:58:51.118 D/CSPLOIT[core.System.init](32069): initializing System...
  174. 03-02 10:58:51.131 E/CSPLOIT[core.System.errorLogging](32069): Neither user 10159 nor current process has android.permission.WAKE_LOCK.
  175. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): java.lang.SecurityException: Neither user 10159 nor current process has android.permission.WAKE_LOCK.
  176. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Parcel.readException(Parcel.java:2004)
  177. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Parcel.readException(Parcel.java:1950)
  178. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.net.wifi.IWifiManager$Stub$Proxy.acquireWifiLock(IWifiManager.java:1455)
  179. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.net.wifi.WifiManager$WifiLock.acquire(WifiManager.java:3043)
  180. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at org.csploit.android.core.System.init(System.java:171)
  181. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at org.csploit.android.CSploitApplication.onCreate(CSploitApplication.java:83)
  182. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.Instrumentation.callApplicationOnCreate(Instrumentation.java:1119)
  183. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread.handleBindApplication(ActivityThread.java:5740)
  184. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread.-wrap1(Unknown Source:0)
  185. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1656)
  186. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Handler.dispatchMessage(Handler.java:106)
  187. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.os.Looper.loop(Looper.java:164)
  188. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at android.app.ActivityThread.main(ActivityThread.java:6494)
  189. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at java.lang.reflect.Method.invoke(Native Method)
  190. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:440)
  191. 03-02 10:58:51.132 E/CSPLOIT[core.System.errorLogging](32069): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:807)
  192. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=6, have_stdin=0, have_stdout=1, name="tcpdump"
  193. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=1, have_stdin=1, have_stdout=1, name="raw"
  194. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=2, have_stdin=0, have_stdout=1, name="nmap"
  195. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=8, have_stdin=0, have_stdout=1, name="network-radar"
  196. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=9, have_stdin=0, have_stdout=1, name="msfrpcd"
  197. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=4, have_stdin=0, have_stdout=1, name="hydra"
  198. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=7, have_stdin=0, have_stdout=1, name="fusemounts"
  199. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=3, have_stdin=0, have_stdout=1, name="ettercap"
  200. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=0, have_stdin=0, have_stdout=0, name="blind"
  201. 03-02 10:58:51.235 D/cSploitClient(32069): on_handler_list: id=5, have_stdin=0, have_stdout=1, name="arpspoof"
  202. 03-02 10:58:51.246 I/CSPLOIT[services.NetworkRadar.onAutoScanChanged](32069): autoScan has been set to true
  203. 03-02 10:58:51.247 E/AndroidRuntime(32069): Process: org.csploit.android, PID: 32069
  204. 03-02 10:58:51.247 E/AndroidRuntime(32069): java.lang.RuntimeException: Unable to start activity ComponentInfo{org.csploit.android/org.csploit.android.MainActivity}: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
  205. 03-02 10:58:51.247 E/AndroidRuntime(32069): Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
  206. 03-02 10:58:51.247 E/AndroidRuntime(32069): at org.csploit.android.core.System.initCore(System.java:356)
  207. 03-02 10:58:51.247 E/AndroidRuntime(32069): at org.csploit.android.MainFragment.init(MainFragment.java:287)
  208. 03-02 10:58:51.247 E/AndroidRuntime(32069): at org.csploit.android.MainFragment.onViewCreated(MainFragment.java:249)
  209. 03-02 10:58:51.247 E/ACRA (32069): ACRA caught a RuntimeException for org.csploit.android
  210. 03-02 10:58:51.247 E/ACRA (32069): java.lang.RuntimeException: Unable to start activity ComponentInfo{org.csploit.android/org.csploit.android.MainActivity}: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
  211. 03-02 10:58:51.247 E/ACRA (32069): Caused by: java.lang.NullPointerException: Attempt to invoke virtual method 'void org.csploit.android.net.Network.onCoreAttached()' on a null object reference
  212. 03-02 10:58:51.247 E/ACRA (32069): at org.csploit.android.core.System.initCore(System.java:356)
  213. 03-02 10:58:51.247 E/ACRA (32069): at org.csploit.android.MainFragment.init(MainFragment.java:287)
  214. 03-02 10:58:51.247 E/ACRA (32069): at org.csploit.android.MainFragment.onViewCreated(MainFragment.java:249)
  215. 03-02 10:58:51.355 I/ActivityManager(2212): Process org.csploit.android (pid 32069) has died: fore TOP
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement