Closed tbonegrady closed 4 years ago
It might be worth attempting to login to the device directly with SSH as that is all this module is intended to do. I am guessing that device may be newer and the path to the command shell is not /bin/sh
as the module expects.
I have tried that the device is a ipad mini 1st gen
Should I go into the module and change it or leave it be?
If you have a fix, we are happy to review a PR. @wvu-r7 seems to remember something about
Net::SSH::CommandStream implements an exec channel request, but no shell channel request
Hi there! We're closing this because it hasn't been active in several years. If you'd like to re-confirm the bug and re-open it, feel free to do so!
Steps to reproduce
So I'm performing a pentest at a local company fond of apple products thats overly smug and I by chance found a jailbroken one with default password. So I decided to test this module out. It does spawn a shell and session but the shell dies.
How Did you do it
This section should also tell us any relevant information about the environment; for example, if an exploit that used to work is failing, tell us the victim operating system and service versions.
Expected behavior
What should happen?
Current behavior
What happens instead?
The shell spawns and makes a session but then the shell dies
You might also want to check the last ~1k lines of
/opt/metasploit/apps/pro/engine/config/logs/framework.log
or~/.msf4/logs/framework.log
for relevant stack tracesTheir wasnt anything regarding the module in the log files Backbox linux only has metasploit-framework installed
System stuff
Metasploit version
Framework: 4.16.12-dev- Console : 4.16.12-dev-
Get this with the
version
command in msfconsole (orgit log -1 --pretty=oneline
for a source install).I installed Metasploit with:
OS
What OS are you running Metasploit on? Backbox Linux