Closed GoogleCodeExporter closed 9 years ago
$ python vol.py --profile=LinuxMetasploitx86 -f
~/Desktop/Metasploitable-555c9224.vmem linux_check_tty
Volatile Systems Volatility Framework 2.3_alpha
Name Address Symbol
---------------- ---------- ------------------------------
Traceback (most recent call last):
File "vol.py", line 186, in <module>
main()
File "vol.py", line 177, in main
command.execute()
File "/Users/michaelligh/Desktop/volatility/volatility/plugins/linux/common.py", line 55, in execute
commands.Command.execute(self, *args, **kwargs)
File "/Users/michaelligh/Desktop/volatility/volatility/commands.py", line 111, in execute
func(outfd, data)
File "/Users/michaelligh/Desktop/volatility/volatility/plugins/linux/tty_check.py", line 59, in render_text
for name, call_addr in data:
File "/Users/michaelligh/Desktop/volatility/volatility/plugins/linux/tty_check.py", line 52, in calculate
recv_buf = tty_dev.ldisc.ops.receive_buf
AttributeError: 'function' object has no attribute 'receive_buf'
Original comment by michael.hale@gmail.com
on 29 Mar 2013 at 8:57
This issue was closed by revision r3211.
Original comment by michael.hale@gmail.com
on 29 Mar 2013 at 10:26
Original issue reported on code.google.com by
michael.hale@gmail.com
on 22 Feb 2013 at 7:19