rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.13k stars 13.97k forks source link

Failed to load module: exploits/windows/misc/regsvr32_applocker_bypass_server.rb #7420

Closed kalifan closed 8 years ago

kalifan commented 8 years ago

Hi, i have a problem, i cant load this exploit i get this following error:

[-] WARNING! The following modules could not be loaded! [-] /root/.msf7/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb: Msf::Modules::MetasploitClassCompatibilityError Failed to load module (windows/misc/regsvr32_applocker_bypass_server from /root/.msf7/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb) due to Missing compatible Metasploit class constant

i found the same problem and solution but form here: https://community.rapid7.com/thread/8408 He said to fix that: Library files are a little trickier. One solution is to put a library called foo.rb in the same directory as the module and do require_relative("./foo") at the top of the module.

i dont know how to fix because i need foo.rb library in my kali linux i cant find it, where can i download?

iam using kali linux 2016.1 (virtualbox). thanks !

wvu commented 8 years ago

That module is from June. You should have it in the tree.

wvu commented 8 years ago

Notice that you're trying to load it from /root/.msf7, which makes no sense.

wvu commented 8 years ago

FWIW, the constant should be MetasploitModule, not Metasploit4 or Metasploit3. Seems you have an outdated version of the module being loaded under a personal path.

wvu commented 8 years ago

And you don't need a foo.rb. That was just an example.

kalifan commented 8 years ago

wvu-r7

Thanks for answer me, but i must tell you the reason that i download it this exploit from github it is because it does not exist into modules kali linux: 2016-10-09_202530

if you see must be there under realtek_playlist. please i need your help i want use that exploit. tell me what i must to do thanks.

PD: in case i need update my bd how i do it?, how i could know if i have all exploit updated?

wvu commented 8 years ago

Do you know how to update Kali? Do that.

wvu commented 8 years ago

If you can't do that, put https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb in ~/.msf4/modules/exploits/windows/misc.

wvu commented 8 years ago

FYI, filing a ticket is for bug reports or feature requests, not for support questions. Please go to the #metasploit IRC channel on freenode or the Rapid7 Community website at https://community.rapid7.com/.

mitulkalsariya commented 3 years ago

in this there is no master folder https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb