Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- eromang@devnull:~$ sudo msfconsole
- [-] WARNING! The following modules could not be loaded!
- [-] /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb: SyntaxError /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:35: syntax error, unexpected tLSHFT, expecting ')'
- <<<<<<< .mine
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:36: syntax error, unexpected tASSOC, expecting keyword_end
- 'Version' => '$Revision: 16005 $',
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:36: syntax error, unexpected ',', expecting keyword_end
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:37: syntax error, unexpected tASSOC, expecting keyword_end
- 'Platform' => [ 'windows' ],
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:37: syntax error, unexpected ',', expecting keyword_end
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:39: syntax error, unexpected tASSOC, expecting keyword_end
- 'Version' => '$Revision: 16005 $',
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:39: syntax error, unexpected ',', expecting keyword_end
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:40: syntax error, unexpected tASSOC, expecting keyword_end
- 'Platform' => [ 'win' ],
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:40: syntax error, unexpected ',', expecting keyword_end
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:42: syntax error, unexpected tASSOC, expecting keyword_end
- 'SessionTypes' => [ 'meterpreter' ]
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:43: syntax error, unexpected ')', expecting keyword_end
- ))
- ^
- /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:379: syntax error, unexpected $end, expecting keyword_end
- MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
- MMMMMMMMMMM MMMMMMMMMM
- MMMN$ vMMMM
- MMMNl MMMMM MMMMM JMMMM
- MMMNl MMMMMMMN NMMMMMMM JMMMM
- MMMNl MMMMMMMMMNmmmNMMMMMMMMM JMMMM
- MMMNI MMMMMMMMMMMMMMMMMMMMMMM jMMMM
- MMMNI MMMMMMMMMMMMMMMMMMMMMMM jMMMM
- MMMNI MMMMM MMMMMMM MMMMM jMMMM
- MMMNI MMMMM MMMMMMM MMMMM jMMMM
- MMMNI MMMNM MMMMMMM MMMMM jMMMM
- MMMNI WMMMM MMMMMMM MMMM# JMMMM
- MMMMR ?MMNM MMMMM .dMMMM
- MMMMNm `?MMM MMMM` dMMMMM
- MMMMMMN ?MM MM? NMMMMMN
- MMMMMMMMNe JMMMMMNMMM
- MMMMMMMMMMNm, eMMMMMNMMNMM
- MMMMNNMNMMMMMNx MMMMMMNMMNMMNM
- MMMMMMMMNMMNMMMMm+..+MMNMMNMNMMNMMNMM
- =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
- + -- --=[ 980 exploits - 525 auxiliary - 160 post
- + -- --=[ 262 payloads - 28 encoders - 8 nops
- msf > use exploit/multi/handler
- msf exploit(handler) > set PAYLOAD osx/x86/shell_reverse_tcp
- PAYLOAD => osx/x86/shell_reverse_tcp
- semsf exploit(handler) > ifconfig
- [*] exec: ifconfig
- eth0 Link encap:Ethernet HWaddr 00:0c:29:e0:ef:41
- inet addr:192.168.178.26 Bcast:192.168.178.255 Mask:255.255.255.0
- UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
- RX packets:88069 errors:0 dropped:0 overruns:0 frame:0
- TX packets:43683 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:1000
- RX bytes:106080018 (106.0 MB) TX bytes:5794234 (5.7 MB)
- lo Link encap:Local Loopback
- inet addr:127.0.0.1 Mask:255.0.0.0
- inet6 addr: ::1/128 Scope:Host
- UP LOOPBACK RUNNING MTU:16436 Metric:1
- RX packets:258514 errors:0 dropped:0 overruns:0 frame:0
- TX packets:258514 errors:0 dropped:0 overruns:0 carrier:0
- collisions:0 txqueuelen:0
- RX bytes:68142527 (68.1 MB) TX bytes:68142527 (68.1 MB)
- msf exploit(handler) > set LHOST 192.168.178.26
- LHOST => 192.168.178.26
- shmsf exploit(handler) > show options
- Module options (exploit/multi/handler):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- Payload options (osx/x86/shell_reverse_tcp):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- LHOST 192.168.178.26 yes The listen address
- LPORT 4444 yes The listen port
- Exploit target:
- Id Name
- -- ----
- 0 Wildcard Target
- msf exploit(handler) > exploit -j
- [-] Exploit failed: can't add a new key into hash during iteration
- msf exploit(handler) > quit
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement