Results 1 to 3 of 3

Thread: SET trying to connect to an OSX shell on Windows victim

  1. #1
    Just burned his ISO
    Join Date
    Jun 2012
    Posts
    1

    Default SET trying to connect to an OSX shell on Windows victim

    Hey everyone,

    it seems to me like SET is trying to connect to my Windows 7 machine with an OSX shell, I have tried this with gnome 64bit and KDE 64bit installed to the HDD, running a bootable USB, and a LiveDVD, to attack both a Win7 and XP machine with known vulnerabilities. The ou
    tput I
    get from the meterpreter is as follows:[*] Command shell session 1 opened (192.168.1.112:8080 -> 192.168.1.100:49679) at 2012-06-25 16:51:07 -0600[*] Session ID 1 (192.168.1.112:8080 -> 192.168.1.100:49679) processing InitialAutoRunScript 'post/osx/gather/enum_osx'

    msf exploit(handler) > sh
    [-] Post failed: NoMethodError undefined method `chomp' for nil:NilClass
    [-] Call stack:
    [-] /opt/metasploit/msf3/modules/post/osx/gather/enum_osx.rb:46:in `run'

    msf exploit(handler) > sessions -i

    Active sessions
    ===============

    Id Type Information Connection
    -- ---- ----------- ----------
    1 shell osx GET / HT
    TP/1.1
    Host: 192.168.1.112:8080 User-Agent: Mozilla/5.0 (Windows NT 6... 192.168.1.112:8080 -> 192.168.1.100:49679 (192.168.1.100)


    I have tried completely removing SET and Metasploit and re-installing both then running the updates. I have also used 2 different PC's with different hardware and still come up with the same errors. My network consists of a linksys wireless router with no restrictions or blocking of any kind and both attacker and victim on the same network. I've read through the bugs and fixes sections on this forum and haven't found anything, google is not helping either. Any help would be appreciated!

    Thanks

  2. #2
    Just burned his ISO
    Join Date
    Jul 2012
    Posts
    2

    Default Re: SET trying to connect to an OSX shell on Windows victim

    I'm seeing the same issue. Anyone know what's going on here?

  3. #3
    Just burned his ISO
    Join Date
    Jul 2012
    Posts
    2

    Default Re: SET trying to connect to an OSX shell on Windows victim

    Quote Originally Posted by vaffunculo1986 View Post
    The output I get from the meterpreter is as follows:[*] Command shell session 1 opened (192.168.1.112:8080 -> 192.168.1.100:49679) at 2012-06-25 16:51:07 -0600[*] Session ID 1 (192.168.1.112:8080 -> 192.168.1.100:49679) processing InitialAutoRunScript 'post/osx/gather/enum_osx'
    I was having the same problem, so I showed it to my boss and he showed me what I was doing wrong. It appears that like me, on the victim system you were visiting port 8080 on the malicious site. That's the port the OSX listener is running on. Not specifying the port and letting it default to 80 loaded the page and attempted the exploit properly.

Similar Threads

  1. windows 7 host, 1 vm attacker, 1 vm victim questions
    By BONES3066 in forum Beginners Forum
    Replies: 2
    Last Post: 01-31-2011, 07:17 PM
  2. windows/shell/reverse_tcp detected by McAfee Ent 8
    By dud29 in forum OLD Pentesting
    Replies: 0
    Last Post: 10-08-2009, 06:43 PM
  3. Connect in shell (problem with enc)
    By kyrgyz in forum OLD Newbie Area
    Replies: 3
    Last Post: 06-22-2008, 07:46 AM
  4. How do I connect to the internet using the shell?
    By ««EDocTooR»» in forum OLD Newbie Area
    Replies: 18
    Last Post: 06-10-2008, 05:50 AM
  5. how to connect to a network in shell?
    By goldmercury in forum OLD Newbie Area
    Replies: 2
    Last Post: 08-10-2007, 09:10 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •