Closed esfomeado closed 6 years ago
Hmm, @wvu-r7 is this related to this upstream Kali patch? http://git.kali.org/gitweb/?p=packages/metasploit-framework.git;a=blob;f=debian/patches/add-missing-requirements-msfvenom.patch;h=05a213e75afdaee549516b03c07fd2ecc6515abb;hb=d07ad0906a20d5c2334a0eea50e2c75fc9f38503
Do we need that too?
Unfortunately, the above patch makes --help almost as slow as before.
Hi,
Try to add:
require '/usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-socket-0.1.13/lib/rex/socket/ssl_tcp.rb'
to opt.rb file (/usr/share/metasploit-framework/lib/msf/core)
It solved my problem.
Thanks for the note @ChopinDebussy
Running bundle exec ./msfvenom -p windows/meterpreter/reverse_tcp --payload-options
also resolves it. Hmm...
Fixed with #9817, this will take a day or so to filter down to apt packages.
Steps to reproduce
How'd you do it?
Expected behavior
Should show the payload options
Current behavior
You might also want to check the last ~1k lines of
/opt/metasploit/apps/pro/engine/config/logs/framework.log
or~/.msf4/logs/framework.log
for relevant stack tracesSystem stuff
Metasploit version
Framework: 4.16.47-dev Console : 4.16.47-dev
I installed Metasploit with:
OS
What OS are you running Metasploit on? 4.12.0-kali2-686