Any console output that is relevant to the issue:
result.csv :
Traceback (error) if any:
I use “/usr/bin/msfconsole” in this step config:
metasploit is not in your PATH, provide the full path to it: /usr/bin/msfconsole
and then:
[+] Executing command 'sudo ruby /usr/bin/msfconsole -r /root/.autosploit_home/autosploit_out/2020-10-17_08h18m22s/testIP/auxiliary-sqli-oracle-jvm_os_code_11g -q'
[+] **RESULTS**
[+] 264 exploits run against 1 hosts.
[+] 0 exploit successful (Check report.csv to validate!).
[+] 0 exploit failed.
[+] Exploit run saved to /root/.autosploit_home/autosploit_out/2020-10-17_08h18m22s
[+] Report saved to /root/.autosploit_home/autosploit_out/2020-10-17_08h18m22s/report.csv
Running information
Exploit module information
Program information
Python version number? 2
AutoSploit version number? lastest (docker)
Any console output that is relevant to the issue: result.csv :
Traceback (error) if any: I use “/usr/bin/msfconsole” in this step config: metasploit is not in your PATH, provide the full path to it: /usr/bin/msfconsole and then: [+] Executing command 'sudo ruby /usr/bin/msfconsole -r /root/.autosploit_home/autosploit_out/2020-10-17_08h18m22s/testIP/auxiliary-sqli-oracle-jvm_os_code_11g -q'
[+] **RESULTS** [+] 264 exploits run against 1 hosts. [+] 0 exploit successful (Check report.csv to validate!). [+] 0 exploit failed. [+] Exploit run saved to /root/.autosploit_home/autosploit_out/2020-10-17_08h18m22s [+] Report saved to /root/.autosploit_home/autosploit_out/2020-10-17_08h18m22s/report.csv