milo2012 / metasploitHelper

metasploitHelper
242 stars 73 forks source link

script Error or missing dependency ---HELP!!! #27

Closed filebe777 closed 5 years ago

filebe777 commented 6 years ago

How do i solve this in kali linux?

** Finding MSF Modules which TARGETURI is set to / *** Test Results from Metasploit Modules Please wait ...

<Thread:0x00007f7519486e68@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f7541326258@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 7: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 6: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 5: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:53:in gets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:53:ingetc': stream closed in another thread (IOError)

<Thread:0x00007f75410d13e0@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 7: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 6: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 5: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:53:in gets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:53:ingetc': stream closed in another thread (IOError)

<Thread:0x00007f7518df0478@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00005567f3896948@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00005567f395b270@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f7520372c00@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00005567f3b37c38@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f7518226840@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 7: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 6: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 5: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:53:in gets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:53:ingetc': stream closed in another thread (IOError)

milo2012 commented 6 years ago

Hi Can you check if you can run the below command in your Kali Linux ? Does it return any errors ?

/usr/share/metasploit-framework/msfconsole

filebe777 commented 6 years ago

It ran with the following error. root@welshman:~# /usr/share/metasploit-framework/msfconsole [-] Failed to connect to the database: FATAL: password authentication failed for user "msf" FATAL: password authentication failed for user "msf"

Metasploit Park, System Security Interface Version 4.0.5, Alpha E Ready...

filebe777 commented 6 years ago

waiting for your response ..plsss.

milo2012 commented 6 years ago

There appears to be some issues with your installation of Metasploit framework. Are you able to try metasploitHelper on a new installation of Kali/Metasploit framework ? Thanks

filebe777 commented 6 years ago

I ran metasploitHelper on a new installation of Kali and this is what i got.... so much error in between .. see below

~/msfrpc/python-msfrpc/metasploitHelper# python msfHelper.py -a 154.8.131.171 [] Launching Metasploit msfrpcd [] MSGRPC starting on 127.0.0.1:55552 (NO SSL):Msg... [] URI: /api/ [] MSGRPC backgrounding at 2018-07-24 18:42:53 -0800... [] Reading from msfHelper.db [] Running Nmap against target: 154.8.131.171 Starting Nmap 7.70 ( https://nmap.org ) at 2018-07-24 18:42 AKDT Nmap scan report for 154.8.131.171 Host is up (0.43s latency). Not shown: 8304 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 80/tcp open tcpwrapped 443/tcp open ssl/https? 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.70%T=SSL%I=7%D=7/24%Time=5B57EF5F%P=x86_64-pc-linux-gnu SF:%r(tor-versions,135,"HTTP/1.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue SF:,\x2024\x20Jul\x202018\x2014:31:59\x20GMT\r\nContent-Type:\x20text/html SF:\r\nContent-Length:\x20166\r\nConnection:\x20close\r\nServer:\x20dae\r\ SF:n\r\n\r\n400\x20Bad\x20Request\r\n<bo SF:dy\x20bgcolor=\"white\">\r\n

400\x20Bad\x20Request

</cen SF:ter>\r\n
nginx
\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: D-Link DWL-G810 WAP (95%), Denon AVR-2113 audio receiver (95%), Actiontec MI424WR-GEN3I WAP (95%), DD-WRT v24-sp2 (Linux 2.4.37) (95%), D-Link DI-524 or WBR-2310 wireless broadband router (95%), Linux 3.2 (95%), Linux 4.4 (95%), DEC OpenVMS 7.1 (93%), Allied Telesyn AT-9448Ts/XP switch (92%), TiVo series 1 (Linux 2.1.24-TiVo-2.5) (91%) No exact OS matches for host (test conditions non-ideal).

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 3070.23 seconds

[*] Loaded 2811 modules from Metasploit

Finding MSF Modules based on Port No Host Category Metasploit Module


154.8.131.171:443 exploit linux/http/accellion_fta_getstatus_oauth 154.8.131.171:443 exploit linux/http/alcatel_omnipcx_mastercgi_exec 154.8.131.171:443 exploit linux/http/alienvault_exec 154.8.131.171:443 exploit linux/http/alienvault_sqli_exec 154.8.131.171:443 exploit linux/http/cfme_manageiq_evm_upload_exec 154.8.131.171:443 exploit linux/http/f5_icall_cmd 154.8.131.171:443 exploit linux/http/f5_icontrol_exec 154.8.131.171:443 exploit linux/http/foreman_openstack_satellite_code_exec 154.8.131.171:443 exploit linux/http/goautodial_3_rce_command_injection 154.8.131.171:443 exploit linux/http/lifesize_uvc_ping_rce 154.8.131.171:443 exploit linux/http/netgear_readynas_exec 154.8.131.171:443 exploit linux/http/op5_config_exec 154.8.131.171:443 exploit linux/http/riverbed_netprofiler_netexpress_exec 154.8.131.171:443 exploit linux/http/sophos_wpa_sblistpack_exec 154.8.131.171:443 exploit linux/http/ueb9_api_storage 154.8.131.171:443 exploit linux/ssh/ubiquiti_airos_file_upload 154.8.131.171:443 exploit multi/http/op5_license 154.8.131.171:443 exploit multi/http/op5_license 154.8.131.171:443 exploit multi/http/op5_welcome 154.8.131.171:443 exploit multi/http/op5_welcome 154.8.131.171:443 exploit multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi 154.8.131.171:443 exploit multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi 154.8.131.171:443 exploit multi/http/zenworks_configuration_management_upload 154.8.131.171:443 exploit multi/http/zenworks_configuration_management_upload 154.8.131.171:443 exploit multi/http/zenworks_control_center_upload 154.8.131.171:443 exploit multi/http/zenworks_control_center_upload 154.8.131.171:443 exploit unix/http/pfsense_graph_injection_exec 154.8.131.171:443 exploit unix/http/pfsense_graph_injection_exec 154.8.131.171:443 exploit unix/http/pfsense_group_member_exec 154.8.131.171:443 exploit unix/http/pfsense_group_member_exec 154.8.131.171:443 exploit unix/webapp/citrix_access_gateway_exec 154.8.131.171:443 exploit unix/webapp/citrix_access_gateway_exec 154.8.131.171:443 exploit linux/http/panos_readsessionvars 154.8.131.171:443 auxiliary gather/emc_cta_xxe 154.8.131.171:443 auxiliary gather/f5_bigip_cookie_disclosure 154.8.131.171:443 auxiliary gather/hp_snac_domain_creds 154.8.131.171:443 auxiliary gather/ibm_sametime_enumerate_users 154.8.131.171:443 auxiliary gather/ibm_sametime_version 154.8.131.171:443 auxiliary gather/impersonate_ssl 154.8.131.171:443 auxiliary gather/qnap_backtrace_admin_hash 154.8.131.171:443 auxiliary scanner/http/accellion_fta_statecode_file_read 154.8.131.171:443 auxiliary scanner/http/cert 154.8.131.171:443 auxiliary scanner/http/chef_webui_login 154.8.131.171:443 auxiliary scanner/http/cisco_asa_asdm 154.8.131.171:443 auxiliary scanner/http/cisco_ironport_enum 154.8.131.171:443 auxiliary scanner/http/cisco_nac_manager_traversal 154.8.131.171:443 auxiliary scanner/http/cisco_ssl_vpn 154.8.131.171:443 auxiliary scanner/http/cisco_ssl_vpn_priv_esc 154.8.131.171:443 auxiliary scanner/http/dell_idrac 154.8.131.171:443 auxiliary scanner/http/http_hsts 154.8.131.171:443 auxiliary scanner/http/infovista_enum 154.8.131.171:443 auxiliary scanner/http/oracle_ilom_login 154.8.131.171:443 auxiliary scanner/http/owa_ews_login 154.8.131.171:443 auxiliary scanner/http/owa_iis_internal_ip 154.8.131.171:443 auxiliary scanner/http/owa_login 154.8.131.171:443 auxiliary scanner/http/smt_ipmi_static_cert_scanner 154.8.131.171:443 auxiliary scanner/http/ssl 154.8.131.171:443 auxiliary scanner/openvas/openvas_gsad_login 154.8.131.171:443 auxiliary scanner/ssl/openssl_ccs 154.8.131.171:443 auxiliary scanner/ssl/openssl_heartbleed 154.8.131.171:443 auxiliary scanner/vmware/esx_fingerprint 154.8.131.171:443 auxiliary scanner/vmware/vmware_enum_permissions 154.8.131.171:443 auxiliary scanner/vmware/vmware_enum_sessions 154.8.131.171:443 auxiliary scanner/vmware/vmware_enum_users 154.8.131.171:443 auxiliary scanner/vmware/vmware_enum_vms 154.8.131.171:443 auxiliary scanner/vmware/vmware_host_details 154.8.131.171:443 auxiliary scanner/vmware/vmware_http_login 154.8.131.171:443 auxiliary scanner/vmware/vmware_screenshot_stealer

Test Results from Metasploit Modules Please wait ...

<Thread:0x0000562f4e786be8@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f11153f4a58@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f111048d5f0@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f1115dd8740@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 18: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 17: from /usr/share/metasploit-framework/lib/rex/thread_factory.rb:22:inblock in spawn' 16: from /usr/share/metasploit-framework/lib/rex/job.rb:39:in block in start' 15: from /usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:153:inblock in run' 14: from /usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:254:in job_cleanup_proc' 13: from /usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:254:insynchronize' 12: from /usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:254:in block in job_cleanup_proc' 11: from /usr/share/metasploit-framework/modules/exploits/linux/http/alienvault_sqli_exec.rb:299:incleanup' 10: from /usr/share/metasploit-framework/lib/msf/core/exploit/http/client.rb:361:in send_request_cgi' 9: from /usr/share/metasploit-framework/lib/rex/proto/http/client.rb:210:insend_recv' 8: from /usr/share/metasploit-framework/lib/rex/proto/http/client.rb:229:in _send_recv' 7: from /usr/share/metasploit-framework/lib/rex/proto/http/client.rb:244:insend_request' 6: from /usr/share/metasploit-framework/lib/rex/proto/http/client.rb:177:in connect' 5: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.14/lib/rex/socket/tcp.rb:28:increate' 4: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.14/lib/rex/socket/tcp.rb:37:in create_param' 3: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.14/lib/rex/socket.rb:49:increate_param' 2: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.14/lib/rex/socket/comm/local.rb:33:in create' 1: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.14/lib/rex/socket/comm/local.rb:263:increate_by_type' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.14/lib/rex/socket/comm/local.rb:291:in `rescue in create_by_type': The connection timed out (154.8.131.171:443). (Rex::ConnectionTimeout)

<Thread:0x00007f11103c3188@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f111557a9b8@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError) 154.8.131.171:443 exploit/linux/http/accellion_fta_getstatus_oauth [FAILED] 154.8.131.171:443 exploit/linux/http/alcatel_omnipcx_mastercgi_exec [FAILED] 154.8.131.171:443 exploit/linux/http/alienvault_exec [FAILED] 154.8.131.171:443 exploit/linux/http/alienvault_sqli_exec [FAILED] 154.8.131.171:443 exploit/linux/http/cfme_manageiq_evm_upload_exec [FAILED] 154.8.131.171:443 exploit/linux/http/f5_icall_cmd [FAILED] 154.8.131.171:443 exploit/linux/http/f5_icontrol_exec [FAILED] 154.8.131.171:443 exploit/linux/http/foreman_openstack_satellite_code_exec [FAILED] 154.8.131.171:443 exploit/linux/http/goautodial_3_rce_command_injection [FAILED] 154.8.131.171:443 exploit/linux/http/lifesize_uvc_ping_rce [FAILED] 154.8.131.171:443 exploit/linux/http/netgear_readynas_exec [FAILED] 154.8.131.171:443 exploit/linux/http/op5_config_exec [FAILED] 154.8.131.171:443 exploit/linux/http/riverbed_netprofiler_netexpress_exec [FAILED] 154.8.131.171:443 exploit/linux/http/sophos_wpa_sblistpack_exec [FAILED] 154.8.131.171:443 exploit/linux/http/ueb9_api_storage [FAILED] 154.8.131.171:443 exploit/linux/ssh/ubiquiti_airos_file_upload [FAILED] 154.8.131.171:443 exploit/multi/http/op5_license [FAILED] 154.8.131.171:443 exploit/multi/http/op5_welcome [FAILED] 154.8.131.171:443 exploit/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi [FAILED] 154.8.131.171:443 exploit/multi/http/zenworks_configuration_management_upload [FAILED] 154.8.131.171:443 exploit/multi/http/zenworks_control_center_upload [FAILED] 154.8.131.171:443 exploit/unix/http/pfsense_graph_injection_exec [FAILED] 154.8.131.171:443 exploit/unix/http/pfsense_group_member_exec [FAILED] 154.8.131.171:443 exploit/unix/webapp/citrix_access_gateway_exec [FAILED] 154.8.131.171:443 exploit/linux/http/panos_readsessionvars [FAILED]

<Thread:0x0000562f4f85a168@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f1116f41d38@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f10e8070f58@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f1115d95c88@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f10e8071b60@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f10ee95ab40@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x0000562f4c73f560@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError)

<Thread:0x00007f11160cafc0@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):

Traceback (most recent call last): 6: from /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in block in spawn' 5: from /usr/share/metasploit-framework/lib/msf/ui/web/console.rb:72:inblock in initialize' 4: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:191:in run' 3: from /usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:375:inget_input_line' 2: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:151:in pgets' 1: from /usr/share/metasploit-framework/lib/rex/ui/text/bidirectional_pipe.rb:121:ingets' /usr/share/metasploit-framework/lib/rex/ui/text/input/buffer.rb:56:in `gets': no implicit conversion of nil into String (TypeError) 154.8.131.171:443 auxiliary/gather/emc_cta_xxe 154.8.131.171:443 auxiliary/gather/f5_bigip_cookie_disclosure 154.8.131.171:443 auxiliary/gather/hp_snac_domain_creds 154.8.131.171:443 auxiliary/gather/ibm_sametime_enumerate_users 154.8.131.171:443 auxiliary/gather/ibm_sametime_version 154.8.131.171:443 auxiliary/gather/impersonate_ssl 154.8.131.171:443 auxiliary/gather/qnap_backtrace_admin_hash 154.8.131.171:443 auxiliary/scanner/http/accellion_fta_statecode_file_read 154.8.131.171:443 auxiliary/scanner/http/cert 154.8.131.171:443 auxiliary/scanner/http/chef_webui_login 154.8.131.171:443 auxiliary/scanner/http/cisco_asa_asdm 154.8.131.171:443 auxiliary/scanner/http/cisco_ironport_enum 154.8.131.171:443 auxiliary/scanner/http/cisco_nac_manager_traversal 154.8.131.171:443 auxiliary/scanner/http/cisco_ssl_vpn 154.8.131.171:443 auxiliary/scanner/http/cisco_ssl_vpn_priv_esc 154.8.131.171:443 auxiliary/scanner/http/dell_idrac 154.8.131.171:443 auxiliary/scanner/http/http_hsts 154.8.131.171:443 auxiliary/scanner/http/infovista_enum 154.8.131.171:443 auxiliary/scanner/http/oracle_ilom_login 154.8.131.171:443 auxiliary/scanner/http/owa_ews_login 154.8.131.171:443 auxiliary/scanner/http/owa_iis_internal_ip 154.8.131.171:443 auxiliary/scanner/http/owa_login 154.8.131.171:443 auxiliary/scanner/http/smt_ipmi_static_cert_scanner 154.8.131.171:443 auxiliary/scanner/http/ssl 154.8.131.171:443 auxiliary/scanner/openvas/openvas_gsad_login 154.8.131.171:443 auxiliary/scanner/ssl/openssl_ccs 154.8.131.171:443 auxiliary/scanner/ssl/openssl_heartbleed 154.8.131.171:443 auxiliary/scanner/vmware/vmware_enum_permissions 154.8.131.171:443 auxiliary/scanner/vmware/vmware_enum_sessions 154.8.131.171:443 auxiliary/scanner/vmware/vmware_enum_vms 154.8.131.171:443 auxiliary/scanner/vmware/vmware_host_details 154.8.131.171:443 auxiliary/scanner/vmware/vmware_screenshot_stealer

List of Modules to Run Manually Host Module Parameters


154.8.131.171:80 auxiliary/gather/xerox_workcentre_5xxx_ldap NewLDAPServer 154.8.131.171:80 auxiliary/scanner/http/apache_mod_cgi_bash_env TARGETURI 154.8.131.171:80 auxiliary/scanner/http/enum_wayback DOMAIN 154.8.131.171:80 auxiliary/scanner/http/httpbl_lookup HTTPBL_APIKEY 154.8.131.171:80 auxiliary/scanner/http/litespeed_source_disclosure PATH_SAVE 154.8.131.171:80 auxiliary/scanner/http/nginx_source_disclosure PATH_SAVE 154.8.131.171:80 auxiliary/scanner/http/squid_pivot_scanning RANGE 154.8.131.171:80 auxiliary/scanner/http/vhost_scanner DOMAIN 154.8.131.171:80 auxiliary/scanner/http/web_vulndb VULNCSV 154.8.131.171:80 auxiliary/scanner/http/wp_nextgen_galley_file_read WP_USER|WP_PASS 154.8.131.171:80 auxiliary/scanner/http/wp_subscribe_comments_file_read WP_USER|WP_PASS 154.8.131.171:80 auxiliary/scanner/rogue/rogue_send EHOST 154.8.131.171:80 auxiliary/voip/telisca_ips_lock_control PHONENAME 154.8.131.171:80 exploit/linux/http/efw_chpasswd_exec EFW_PASSWORD|EFW_USERNAME 154.8.131.171:80 exploit/linux/http/kaltura_unserialize_cookie_rce ENTRYID 154.8.131.171:80 exploit/linux/http/linksys_wrt160nv2_apply_exec LHOST 154.8.131.171:80 exploit/linux/http/netgear_dnslookup_cmd_exec USERNAME|PASSWORD 154.8.131.171:80 exploit/linux/http/symantec_web_gateway_restore USERNAME|PASSWORD 154.8.131.171:80 exploit/linux/http/trueonline_p660hn_v2_rce LHOST 154.8.131.171:80 exploit/multi/http/activecollab_chat PASS|USER 154.8.131.171:80 exploit/multi/http/apache_mod_cgi_bash_env_exec TARGETURI 154.8.131.171:80 exploit/multi/http/bolt_file_upload PASSWORD|USERNAME 154.8.131.171:80 exploit/multi/http/moodle_cmd_exec PASSWORD 154.8.131.171:80 exploit/multi/http/nibbleblog_file_upload USERNAME|PASSWORD 154.8.131.171:80 exploit/multi/http/qdpm_upload_exec PASSWORD|USERNAME 154.8.131.171:80 exploit/multi/http/rails_secret_deserialization SECRET 154.8.131.171:80 exploit/multi/http/sit_file_upload USERNAME|PASSWORD 154.8.131.171:80 exploit/multi/http/wikka_spam_exec USERNAME|PASSWORD|PAGE 154.8.131.171:80 exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload FORM_PATH 154.8.131.171:80 exploit/multi/http/x7chat2_php_exec PASSWORD|USERNAME 154.8.131.171:80 exploit/unix/webapp/get_simple_cms_upload_exec USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/hastymail_exec PASS|USER 154.8.131.171:80 exploit/unix/webapp/nagios_graph_explorer PASSWORD 154.8.131.171:80 exploit/unix/webapp/openemr_sqli_privesc_upload PASS|USER 154.8.131.171:80 exploit/unix/webapp/opensis_modname_exec USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/openx_banner_edit USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/piwik_superuser_plugin_upload USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/sugarcrm_unserialize_exec USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/wp_admin_shell_upload USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/wp_ajax_load_more_file_upload WP_PASSWORD|WP_USERNAME 154.8.131.171:80 exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload USERNAME|PASSWORD 154.8.131.171:80 exploit/unix/webapp/wp_slideshowgallery_upload WP_USER|WP_PASSWORD 154.8.131.171:80 exploit/unix/webapp/wp_wptouch_file_upload PASSWORD|USER 154.8.131.171:80 exploit/unix/webapp/zpanel_username_exec USERNAME|PASSWORD 154.8.131.171:80 exploit/windows/http/sysax_create_folder SysaxUSER|SysaxPASS 154.8.131.171:443 auxiliary/gather/alienvault_iso27001_sqli USERNAME|PASSWORD 154.8.131.171:443 auxiliary/gather/alienvault_newpolicyform_sqli USERNAME|PASSWORD 154.8.131.171:443 auxiliary/gather/ibm_sametime_room_brute DICT|OWNER 154.8.131.171:443 auxiliary/scanner/http/symantec_brightmail_ldapcreds USERNAME|PASSWORD 154.8.131.171:443 exploit/linux/http/sophos_wpa_iface_exec USERNAME|PASSWORD 154.8.131.171:443 exploit/linux/http/symantec_messaging_gateway_exec SSH_PASSWORD|SSH_ADDRESS|USERNAME|PASSWORD|SSH_USERNAME 154.8.131.171:443 exploit/unix/webapp/tuleap_rest_unserialize_exec USERNAME|PASSWORD 154.8.131.171:443 exploit/unix/webapp/tuleap_unserialize_exec USERNAME|PASSWORD

Finding Modules Based on Keyword: tcpwrapped No results found

Finding Modules Based on Keyword: https No results found

[] 0 HTTP servers detected [] 0 HTTPs servers detected

Finding MSF Modules - Bruteforcing URI Paths No results found

Traceback (most recent call last): File "msfHelper.py", line 2281, in runMain() File "msfHelper.py", line 1987, in runMain runExploitDBModules() File "msfHelper.py", line 843, in runExploitDBModules exploitDBList=readExploitDB() File "msfHelper.py", line 2039, in readExploitDB cur=conn.execute("SELECT filename,pathName,url,category from exploitDB") sqlite3.OperationalError: no such table: exploitDB

milo2012 commented 6 years ago

I investigated the issue. The issue appears to be with the version of Ruby used by Metasploit Framework. When I downgraded the version of Ruby and I no longer received the error messages. I built a Docker container to temporarily solve this issue (with an older version of Ruby).

$ docker pull milo2012/metasploithelper $ docker run --rm -it milo2012/metasploithelper $ python msfHelper.py -a testphp.vulnweb.com

filebe777 commented 6 years ago

how do i install the docker?

i have new error -- see below (port not binding)

root@kali:~/msfrpc/python-msfrpc/metasploitHelper# sudo python msfHelper.py -u [] Launching Metasploit msfrpcd [] MSGRPC starting on 127.0.0.1:55552 (NO SSL):Msg... [] URI: /api/ [] MSGRPC backgrounding at 2018-09-10 16:41:23 -0700... [*] Running msfupdate msfupdate is no longer supported when Metasploit is part of the operating system. Please use 'apt update; apt install metasploit-framework' Traceback (most recent call last): 11: from /usr/share/metasploit-framework/msfrpcd:111:in <main>' 10: from /usr/share/metasploit-framework/plugins/msgrpc.rb:94:inrun' 9: from /usr/share/metasploit-framework/lib/msf/core/rpc/v10/service.rb:61:in start' 8: from /usr/share/metasploit-framework/lib/rex/service_manager.rb:25:instart' 7: from /usr/share/metasploit-framework/lib/rex/service_manager.rb:81:in start' 6: from /usr/share/metasploit-framework/lib/rex/proto/http/server.rb:145:instart' 5: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.15/lib/rex/socket/tcp_server.rb:29:in create' 4: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.15/lib/rex/socket/tcp_server.rb:39:increate_param' 3: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.15/lib/rex/socket.rb:49:in create_param' 2: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.15/lib/rex/socket/comm/local.rb:33:increate' 1: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.15/lib/rex/socket/comm/local.rb:174:in create_by_type' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.15/lib/rex/socket/comm/local.rb:187:inrescue in create_by_type': The address is already in use or unavailable: (127.0.0.1:55552). (Rex::BindFailed)

filebe777 commented 5 years ago

how do i build docker in kali linux pls?