Open ttskym opened 6 years ago
Wow, psnuffle
!
Probably need the packet the caused this for a rational debug.
I also encountered this mistake
me too!!!
@Jheack do you have a packet capture? Which protocol? lldp
?
@busterb all right , it has been a long time since i issued the problem...
5.3.0-kali3-amd64 #1 SMP Debian 5.3.15-1kali1 (2019-12-09) x86_64 GNU/Linux 不知的什么导致的,最新版的也不能用
msf5 auxiliary(sniffer/psnuffle) > run [] Auxiliary module running as background job 1. msf5 auxiliary(sniffer/psnuffle) > [] Loaded protocol FTP from /usr/share/metasploit-framework/data/exploits/ [] Loaded protocol IMAP from /usr/share/metasploit-framework/data/exploits [] Loaded protocol POP3 from /usr/share/metasploit-framework/data/exploits [] Loaded protocol SMB from /usr/share/metasploit-framework/data/exploits/ [] Loaded protocol URL from /usr/share/metasploit-framework/data/exploits/ [] Sniffing traffic..... [] HTTP GET: 10.20.24.105:29471-140.205.164.1:80 http://gm.mmstat.com//wwx [-] Auxiliary failed: ArgumentError malformed UTF-8 character [-] Call stack: [-] /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/packetf [-] /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/packetf [-] /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/packetf [-] /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/packetf [-] /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/packetf [-] /usr/share/metasploit-framework/modules/auxiliary/sniffer/psnuffle.rb [-] /usr/share/metasploit-framework/lib/msf/core/exploit/capture.rb:171:i [-] /usr/share/metasploit-framework/lib/msf/core/exploit/capture.rb:170:i [-] /usr/share/metasploit-framework/lib/msf/core/exploit/capture.rb:170:i [-] /usr/share/metasploit-framework/modules/auxiliary/sniffer/psnuffle.rb
msf5 auxiliary(sniffer/psnuffle) >
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
version: metasploit v6.3.27-dev I encountered this mistake
@Emily201505 Are you able to consistently replicate this issue? We can't fix reliably fix this without knowing the protocol that caused the issue etc
@Emily201505 - any chance you could acquire the actual LLDP packet causing this into a pcap/base64/something we can use to reproduce? Quick glance at where thats happening kinda makes me wonder "how"
@sempervictus
Thanks for the screenshot, i was hoping for a pcap of the packet. However, that does at least show us where we need to add an exception handler - in this case, packetfu itself.
I have the same problem. How can I solve it ,in the metasploit framework ,use Auxiliary (sniffer/psnuffle) failed.
I got a error when running psnuffle sniffer in the metasploit framework.
System: Linux kali 4.14.0-kali1-amd64 #1 SMP Debian 4.14.2-1kali1 (2017-12-04) x86_64 GNU/Linux
Metasploit: Package: metasploit-framework Version: 4.16.31-0kali1