Command shell session 1 closed. Reason: Died from EOFError can you help
msf exploit(hagent_untrusted_hsdata) > exploit -j[*] Exploit running as background job.[*] Started bind handler[*] Connecting to the target[*] Starting the FTP server[*] Generating the EXE[*] Starting the HTTP service[*] Starting the HTTP service on port 34141
[-] Exploit failed: EOFError EOFError
[-] Call stack:
[-] /usr/share/metasploit-framework/lib/rex/io/stream.rb:203:in `get_once'
[-] /usr/share/metasploit-framework/modules/exploits/multi/wyse/hagent_untrusted_hsdata.rb:153:in `exploit'
[-] /usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:205:in `job_run_proc'
[-] /usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:152:in `block in run'
[-] /usr/share/metasploit-framework/lib/rex/job_container.rb:37:in `call'
[-] /usr/share/metasploit-framework/lib/rex/job_container.rb:37:in `block in start'
[-] /usr/share/metasploit-framework/lib/rex/thread_factory.rb:22:in `call'
[-] /usr/share/metasploit-framework/lib/rex/thread_factory.rb:22:in `block in spawn'
[-] /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in `call'
[-] /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in `block in spawn'[*] Server stopped.[*] 192.168.1.1 - Command shell session 1 closed. Reason: Died from EOFError
Last edited by lalmi; 02-14-2015 at 01:54 PM.
|