Page 2 of 2 FirstFirst 12
Results 11 to 13 of 13

Thread: Pcaprub module problem

  1. #11
    Just burned his ISO
    Join Date
    Jun 2009
    Posts
    1

    Default Re: Pcaprub module problem

    Starting from terminal works for me whether or not X Server is running. It does not run when you use the GUI to launch the MSF console.

  2. #12
    Just burned his ISO neriberto's Avatar
    Join Date
    Nov 2010
    Location
    Limeira/SP/Brazil
    Posts
    8

    Default Re: Pcaprub module problem

    Hi, I was trying many things but only works if I start the msfconsole in terminal running with "./" before the msfconsole in other words:

    root@bt: ./msfconsole

  3. #13
    Just burned his ISO
    Join Date
    Mar 2010
    Posts
    7

    Default Re: Pcaprub module problem

    I think this is an issue with a relative path somewhere in Metasploit. If you have completed the fix on
    http://blog.carlosgarciaprado.com/?t...rub-pentesting
    And you still get this:

    Code:
    msf auxiliary(ipidseq) > use auxiliary/scanner/ip/ipidseq
    msf auxiliary(ipidseq) > set RHOSTS 172.31.254.90
    RHOSTS => 172.31.254.90
    msf auxiliary(ipidseq) > exploit
    [*] The Pcaprub module is not available: no such file to load -- pcaprub
    [-] Auxiliary failed: RuntimeError Pcaprub not available
    [-] Call stack:
    [-]   /opt/framework3/msf3/lib/msf/core/exploit/capture.rb:379:in `check_pcaprub_loaded'
    [-]   /opt/framework3/msf3/lib/msf/core/exploit/capture.rb:75:in `open_pcap'
    [-]   (eval):68:in `run_host'
    [-]   /opt/framework3/msf3/lib/msf/core/auxiliary/scanner.rb:92:in `block in run'
    [-]   /opt/framework3/msf3/lib/msf/core/thread_manager.rb:64:in `call'
    [-]   /opt/framework3/msf3/lib/msf/core/thread_manager.rb:64:in `block in spawn'[*] Auxiliary module execution completed
    msf auxiliary(ipidseq) >
    Starting it from the base directory /usr/local/bin seems to be what causes the problem.

    Try this:
    Code:
    root@bt:/pentest/exploits/framework3# ./msfconsole
    msf auxiliary(ipidseq) > exploit
    [*] 172.31.254.90's IPID sequence class: Incremental![*] Scanned 1 of 1 hosts (100% complete)[*] Auxiliary module execution completed
    msf auxiliary(ipidseq) > Interrupt: use the 'exit' command to qui
    If you look at which msfconsole is run by default from the path setting it will be this one:
    Code:
    root@bt:/pentest/exploits/framework3# which msfconsole
    /usr/local/bin/msfconsole
    This is just a link to the one in the /pentest/exploits/framework3 directory but will start it with a different base directory and the external directory is not there when it looks for a relative path to it's base directory.
    Code:
    root@bt:/pentest/exploits/framework3/external/pcaprub#
    Andy
    Sherlock Holmes - "when you have eliminated the impossible, whatever remains, however improbable, must be the truth"

Page 2 of 2 FirstFirst 12

Similar Threads

  1. Metasploit pcaprub fix in BT5
    By scottm99 in forum BackTrack 5 Beginners Section
    Replies: 6
    Last Post: 07-18-2011, 05:29 PM
  2. Problem with tg3 module
    By ilhan in forum Beginners Forum
    Replies: 0
    Last Post: 01-28-2011, 10:00 AM
  3. Replies: 1
    Last Post: 04-18-2010, 06:37 PM
  4. Problem Inserting module
    By n00b_h4xx0r in forum OLD BT3beta General
    Replies: 4
    Last Post: 03-04-2008, 02:05 AM
  5. Perl Module problem
    By amuehlem in forum OLD Newbie Area
    Replies: 1
    Last Post: 01-05-2008, 11:45 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •