Open 0MazaHacka0 opened 8 years ago
Thanks for the report @0MazaHacka0 , as I said in #612 it will be useful to have a full logcat, so I can see the requested URL ( or you can sniff them with wireshark if you don't want to share a full logcat ).
Sadly I have no phone right now, and I cannot test it.
OK, i see the logs and find out that csploit try to fetch data from https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=ProFTPD+or+KnFTPD&t=a , but if we open it in web browser we will find out that request to the server is wrong. use https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=KnFTPD&t=a has an exploits. Others requset like https://www.rapid7.com/db/search?q=OpenSSH&t=a have a list an exploits, but csploit can't see them.
@tux-mind
Use a new nightly. When try to find out exploits for my metasploitable 2, it's just say, that there aren't exploits. Android 6. Lenovo K3 Note