rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
33.89k stars 13.93k forks source link

Msf::OptionValidateError One or more options failed to validate: PASS_FILE. #19042

Closed JxB1990 closed 2 months ago

JxB1990 commented 6 months ago

Steps to reproduce

msf6 auxiliary(scanner/http/cisco_ssl_vpn) > set rhosts xx.x.xxx.214 rhosts => xx.x.xxx.214 msf6 auxiliary(scanner/http/cisco_ssl_vpn) > set rport 3128 rport => 3128 msf6 auxiliary(scanner/http/cisco_ssl_vpn) > set pass_file file:/root/ciscopass.txt pass_file => file:/root/ciscopass.txt msf6 auxiliary(scanner/http/cisco_ssl_vpn) > set username root username => root msf6 auxiliary(scanner/http/cisco_ssl_vpn) > exploit

[-] Msf::OptionValidateError One or more options failed to validate: PASS_FILE.

the text file containing the passwords is simple and no more than 15 lines password 123456 test admin root

everything is updated at this time, im 100% sure thats the path and if i try to use user_file i get the same error, im pretty sure im missing somenthing, so i will be glad if someone can help me, thanks in advance

JxB1990 commented 6 months ago

msf6 auxiliary(scanner/http/cisco_ssl_vpn) > show options

Module options (auxiliary/scanner/http/cisco_ssl_vpn):

Name Current Setting Required Description


ANONYMOUS_LOGIN false yes Attempt to login with a blank username and password BLANK_PASSWORDS false no Try blank passwords for all users BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5 DB_ALL_CREDS false no Try each user/password couple stored in the current database DB_ALL_PASS false no Add all passwords in the current database to the list DB_ALL_USERS false no Add all users in the current database to the list DB_SKIP_EXISTING none no Skip existing credentials stored in the current database (Accepted: none, user, user&realm) GROUP no A specific VPN group to use PASSWORD cisco no A specific password to authenticate with PASS_FILE file:/root/ciscopass.txt no File containing passwords, one per line Proxies no A proxy chain of format type:host:port[,type:host:port][...] RHOSTS 52.5.115.214 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html RPORT 3128 yes The target port (TCP) SSL true no Negotiate SSL/TLS for outgoing connections STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host THREADS 1 yes The number of concurrent threads (max one per host) USERNAME root no A specific username to authenticate as USERPASS_FILE no File containing users and passwords separated by space, one pair per line USER_AS_PASS false no Try the username as the password for all users USER_FILE no File containing usernames, one per line VERBOSE true yes Whether to print output for all attempts VHOST no HTTP server virtual host

github-actions[bot] commented 5 months ago

Hi!

This issue has been left open with no activity for a while now.

We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.

Kerim91 commented 5 months ago

......

baggers27 commented 4 months ago

Apologies if I've misunderstood but should it not just be: set pass_file /root/ciscopass.txt?

github-actions[bot] commented 3 months ago

Hi!

This issue has been left open with no activity for a while now.

We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.

github-actions[bot] commented 2 months ago

Hi again!

It’s been 60 days since anything happened on this issue, so we are going to close it. Please keep in mind that I’m only a robot, so if I’ve closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.