rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
33.49k stars 13.83k forks source link

Metasploit not working on raspbian os #13383

Closed shaontj2 closed 4 years ago

shaontj2 commented 4 years ago

I have installed metasploit through kali armhf repository..but there metasploit isn't working and working .i am using raspberry pi 3 and my os is raspbian ...plz help me to fix this issue it's saying about some gems issue.

gwillcox-r7 commented 4 years ago

Hello @shaontj2, last I checked Raspbian is not a supported operating system. We only offer support for supported operating systems here; any other operating systems are mostly up to the user to figure out how to get working.

With that being said, and this warning in mind, if there is an issue with gems, I would recommend running gem install bundler to install bundler, then run bundle install within the folder that has the Gemfile.lock file within it to install any missing gems that you might not have.

Here is an example on my system:

$ gem install bundler
Fetching bundler-2.1.4.gem
Successfully installed bundler-2.1.4
Parsing documentation for bundler-2.1.4
Installing ri documentation for bundler-2.1.4
Done installing documentation for bundler after 2 seconds
1 gem installed
$ bundle install
Using rake 13.0.1
Using Ascii85 1.0.3
Using concurrent-ruby 1.0.5
Using i18n 0.9.5
Using minitest 5.14.0
Using thread_safe 0.3.6
Using tzinfo 1.2.7
Using activesupport 4.2.11.1
Using builder 3.2.4
Using erubis 2.7.0
Using mini_portile2 2.4.0
Using nokogiri 1.10.9
Using rails-deprecated_sanitizer 1.0.3
Using rails-dom-testing 1.0.9
Using crass 1.0.6
Using loofah 2.5.0
Using rails-html-sanitizer 1.3.0
Using actionview 4.2.11.1
Using rack 1.6.13
Using rack-test 0.6.3
Using actionpack 4.2.11.1
Using activemodel 4.2.11.1
Using arel 6.0.4
Using activerecord 4.2.11.1
Using public_suffix 4.0.4
Using addressable 2.7.0
Using afm 0.2.2
Using arel-helpers 2.11.0
Using ast 2.4.0
Using aws-eventstream 1.1.0
Using aws-partitions 1.306.0
Using aws-sigv4 1.1.3
Using jmespath 1.4.0
Using aws-sdk-core 3.94.0
Using aws-sdk-ec2 1.154.0
Using aws-sdk-iam 1.36.0
Using aws-sdk-kms 1.30.0
Using aws-sdk-s3 1.63.0
Using bcrypt 3.1.12
Using bcrypt_pbkdf 1.0.1
Using bindata 2.4.7
Using bit-struct 0.16
Using bson 4.8.2
Using bundler 1.17.3
Using byebug 11.1.3
Using coderay 1.1.2
Using cookiejar 0.3.3
Using daemons 1.3.1
Using diff-lcs 1.3
Using dnsruby 1.61.3
Using docile 1.3.2
Using ed25519 1.2.4
Using eventmachine 1.2.7
Using em-socksify 0.3.2
Using http_parser.rb 0.6.0
Using em-http-request 1.1.5
Using factory_bot 5.2.0
Using thor 1.0.1
Using railties 4.2.11.1
Using factory_bot_rails 5.2.0
Using faker 2.2.1
Using multipart-post 2.1.1
Using faraday 1.0.1
Using websocket-extensions 0.1.4
Using websocket-driver 0.7.1
Using faye-websocket 0.10.9
Using filesize 0.2.0
Using fivemat 1.3.7
Using hashery 2.1.2
Using hrr_rb_ssh 0.3.0.pre2
Using jaro_winkler 1.5.4
Using rkelly-remix 0.0.7
Using jsobfu 0.4.2
Using json 2.3.0
Using memory_profiler 0.9.14
Using metasm 1.0.4
Using metasploit-concern 2.0.5
Using metasploit-model 2.0.4
Using pg 0.21.0
Using pg_array_parser 0.0.9
Using postgres_ext 3.0.1
Using recog 2.3.7
Using metasploit_data_models 3.0.10
Using net-ssh 6.0.2
Using rex-core 0.1.13
Using rex-socket 0.1.23
Using rubyntlm 0.6.2
Using rubyzip 2.3.0
Using metasploit-credential 3.0.4
Using metasploit-payloads 1.4.1
Using metasploit_payloads-mettle 0.5.21
Using mqtt 0.5.0
Using msgpack 1.3.3
Using nessus_rest 0.1.6
Using net-ldap 0.16.2
Using network_interface 0.0.2
Using nexpose 7.2.1
Using sawyer 0.8.2
Using octokit 4.18.0
Using openssl-ccm 1.2.2
Using openvas-omp 0.0.4
Using pcaprub 0.13.0
Using packetfu 1.1.13
Using patch_finder 1.0.2
Using ruby-rc4 0.1.5
Using ttfunk 1.6.2.1
Using pdf-reader 2.4.0
Using rb-readline 0.5.5
Using redcarpet 3.5.0
Using rex-text 0.2.25
Using rex-arch 0.1.13
Using rex-struct2 0.1.2
Using rex-bin_tools 0.1.6
Using rex-encoder 0.1.4
Using rex-exploitation 0.1.24
Using rex-java 0.1.5
Using rex-mime 0.1.5
Using rex-nop 0.1.1
Using rex-ole 0.1.6
Using rex-random_identifier 0.1.4
Using rex-powershell 0.1.87
Using rex-registry 0.1.3
Using rex-rop_builder 0.1.3
Using rex-sslscan 0.1.5
Using rex-zip 0.1.3
Using ruby-macho 2.2.0
Using windows_error 0.1.2
Using ruby_smb 1.1.0
Using rack-protection 1.5.5
Using tilt 2.0.10
Using sinatra 1.4.8
Using sqlite3 1.3.13
Using sshkey 2.0.0
Using thin 1.7.2
Using tzinfo-data 1.2020.1
Using warden 1.2.7
Using xdr 2.0.0
Using xmlrpc 0.3.0
Using metasploit-framework 5.0.88 from source at `.`
Using method_source 1.0.0
Using parallel 1.19.1
Using parser 2.7.1.2
Using pry 0.13.1
Using pry-byebug 3.9.0
Using rainbow 3.0.0
Using rexml 3.2.4
Using rspec-support 3.9.2
Using rspec-core 3.9.1
Using rspec-expectations 3.9.1
Using rspec-mocks 3.9.1
Using rspec 3.9.0
Using rspec-rails 4.0.0
Using rspec-rerun 1.1.0
Using ruby-progressbar 1.10.1
Using unicode-display_width 1.7.0
Using rubocop 0.82.0
Using ruby-prof 1.3.2
Using simplecov-html 0.12.2
Using simplecov 0.18.2
Using swagger-blocks 3.0.0
Using timecop 0.9.1
Using yard 0.9.24
Bundle complete! 17 Gemfile dependencies, 162 gems now installed.
Use `bundle info [gemname]` to see where a bundled gem is installed.
$ ./msfconsole

      .:okOOOkdc'           'cdkOOOko:.
    .xOOOOOOOOOOOOc       cOOOOOOOOOOOOx.
   :OOOOOOOOOOOOOOOk,   ,kOOOOOOOOOOOOOOO:
  'OOOOOOOOOkkkkOOOOO: :OOOOOOOOOOOOOOOOOO'
  oOOOOOOOO.    .oOOOOoOOOOl.    ,OOOOOOOOo
  dOOOOOOOO.      .cOOOOOc.      ,OOOOOOOOx
  lOOOOOOOO.         ;d;         ,OOOOOOOOl
  .OOOOOOOO.   .;           ;    ,OOOOOOOO.
   cOOOOOOO.   .OOc.     'oOO.   ,OOOOOOOc
    oOOOOOO.   .OOOO.   :OOOO.   ,OOOOOOo
     lOOOOO.   .OOOO.   :OOOO.   ,OOOOOl
      ;OOOO'   .OOOO.   :OOOO.   ;OOOO;
       .dOOo   .OOOOocccxOOOO.   xOOd.
         ,kOl  .OOOOOOOOOOOOO. .dOk,
           :kk;.OOOOOOOOOOOOO.cOk:
             ;kOOOOOOOOOOOOOOOk:
               ,xOOOOOOOOOOOx,
                 .lOOOOOOOl.
                    ,dOd,
                      .

       =[ metasploit v5.0.88-dev-b52a7f237d               ]
+ -- --=[ 2008 exploits - 1095 auxiliary - 343 post       ]
+ -- --=[ 562 payloads - 45 encoders - 10 nops            ]
+ -- --=[ 7 evasion                                       ]

Metasploit tip: After running db_nmap, be sure to check out the result of hosts and services

msf5 > 
busterb commented 4 years ago

Sorry @shaontj2, since we do not maintain the Kali Linux version of Metasploit, you will need to ask in the Kali Linux support forums. Thanks!