Closed GoogleCodeExporter closed 8 years ago
Here is the dmesg in case it's useful.
Original comment by NickPoor...@gmail.com
on 11 Sep 2011 at 10:40
Attachments:
Here is the xml file as well to reproduce the problem. (Attached)
Original comment by NickPoor...@gmail.com
on 11 Sep 2011 at 11:18
Attachments:
I'm curious to see what this does, but I wish more people would provide the raw
file to import when reporting problems like this. It's too much to ask for me
to install OpenVAS, setup a fake network, and scan away hoping to reproduce the
problem. I'll look at this tomorrow and report my findings here. Thanks again
for doing this the right way.
Original comment by rsmu...@gmail.com
on 12 Sep 2011 at 1:10
Wow, I was able to reproduce that one. Made me want to dance or fall onto the
floor in a strange trance. Very weird.
Original comment by rsmu...@gmail.com
on 25 Sep 2011 at 9:14
Okie, so I found the problem. When a metasploit method fails, Armitage displays
everything that was sent to the method as well as the error received.
Metasploit signaled an error because it was unable to detect this file as an
OpenVAS report. If it's legit, I recommend that you file a bug with the
Metasploit team at dev.metasploit.com.
I've modified Armitage to only display the called method name and the error
message now. Next time an import fails, you won't see this crazy disco mode.
Original comment by rsmu...@gmail.com
on 26 Sep 2011 at 3:26
Original issue reported on code.google.com by
NickPoor...@gmail.com
on 11 Sep 2011 at 10:38