c0nn3ct / armitage

Automatically exported from code.google.com/p/armitage
0 stars 0 forks source link

EOFERROR #157

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1. Scanning a host not on the user's network via MSF Scan and using Hail Mary
2. Successfully exploiting any host not on the user's network
3.

What is the expected output? What do you see instead?
 The expected output was for me to be able to pivot, explore, interact, and screenshot my hosts. Unfortunately, the console said "EOFError" and the symbols of the "exploited" hosts disappeared to normal.

What version of Metasploit are you using (type: svn info)? On which
operating system?
BackBox Linux. (http://www.backbox.org/)

Which database are you using?

Please provide any additional information below.
   I googled the EOFerror and OP threw aside the issue saying "He's never seen it before." so here you go, a bug on two instances. Now fix it, please.

Original issue reported on code.google.com by JamesLog...@gmail.com on 26 Dec 2013 at 1:30

GoogleCodeExporter commented 8 years ago
Now, fix it please? What?!? I've never seen this before in a supported 
environment. Sorry. The great thing about open source--you can dig into the 
source code and figure out the problem. Please send in a patch. I'll gladly 
look at it when you track down the problem and report exact steps to reproduce 
it.

Merry Christmas!

Original comment by rsmu...@gmail.com on 26 Dec 2013 at 2:42