Knowledge Base

Ask A Question

Questions

2

msfconsole command not working

I installed metasploit community now when i run my msfconsole command in my terminal . The msfconsole not working. It is giving the following results . My operating system is Ubuntu 18.__ <pre><font color="#000000"><b>Traceback</b></font> (most recent call last): 34: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/bin/msfconsole:23:in `&lt;main&gt;&apos; 33: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/bin/msfconsole:23:in `load&apos; 32: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/metasploit-framework-4.17.61/msfconsole:49:in `&lt;top (required)&gt;&apos; 31: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/metasploit-framework-4.17.61/lib/metasploit/framework/command/base.rb:81:in `start&apos; 30: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/metasploit-framework-4.17.61/lib/metasploit/framework/command/base.rb:63:in `require_environment!&apos; 29: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/application.rb:328:in `require_environment!&apos; 28: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/polyglot-0.3.5/lib/polyglot.rb:65:in `require&apos; 27: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/backports-3.15.0/lib/backports/std_lib.rb:9:in `require_with_backports&apos; 26: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/backports-3.15.0/lib/backports/std_lib.rb:9:in `require&apos; 25: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/metasploit-framework-4.17.61/config/environment.rb:5:in `&lt;top (required)&gt;&apos; 24: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/railtie.rb:194:in `method_missing&apos; 23: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/railtie.rb:194:in `public_send&apos; 22: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/application.rb:352:in `initialize!&apos; 21: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/initializable.rb:54:in `run_initializers&apos; 20: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:205:in `tsort_each&apos; 19: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:226:in `tsort_each&apos; 18: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:347:in `each_strongly_connected_component&apos; 17: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:347:in `call&apos; 16: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:347:in `each&apos; 15: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:349:in `block in each_strongly_connected_component&apos; 14: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:431:in `each_strongly_connected_component_from&apos; 13: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:350:in `block (2 levels) in each_strongly_connected_component&apos; 12: from /opt/metasploit/ruby/lib/ruby/2.5.0/tsort.rb:228:in `block in tsort_each&apos; 11: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/initializable.rb:55:in `block in run_initializers&apos; 10: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/initializable.rb:30:in `run&apos; 9: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/initializable.rb:30:in `instance_exec&apos; 8: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/application/finisher.rb:56:in `block in &lt;module:Finisher&gt;&apos; 7: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/application/finisher.rb:56:in `each&apos; 6: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/engine.rb:346:in `eager_load!&apos; 5: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/engine.rb:469:in `eager_load!&apos; 4: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/engine.rb:469:in `each&apos; 3: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/engine.rb:471:in `block in eager_load!&apos; 2: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/engine.rb:471:in `each&apos; 1: from /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/railties-4.2.11.1/lib/rails/engine.rb:472:in `block (2 levels) in eager_load!&apos; /opt/metasploit/apps/pro/vendor/bundle/ruby/2.5.0/gems/wicked-0.5.0/app/controllers/wicked/wizard_controller.rb:5:in `&lt;top (required)&gt;&apos;: <font color="#000000"><b>uninitialized constant ApplicationController (</b></font><font color="#000000"><u style="text-decoration-style:single"><b>NameError</b></u></font><font color="#000000"><b>)</b></font></pre>

metasploit

Posted by himanshu 2 months ago

0

Metasploit Queries

Dear Experts Hi, We are evaluating penetration testing tool and have a few questions related to Metasploit by Rapid7 and would really appreciate if you kindly provide your kind comments/feedback. • Does Metasploit supports penetration testing of surveillance cameras/IP Cameras? • Does Metasploit supports penetration testing of wireless network? We have done a bit of our homework as well and would like your feedback/review/comments on the said. Surveillance Cameras/CCTV/IP Cameras Below URLs confirms that Metasploit framework support the said. • https://www.exploit-db.com/exploits/45231 • https://www.rapid7.com/db/modules/auxiliary/scanner/http/bavision_cam_login • https://blog.rapid7.com/2012/05/15/attacking-cctv-video-surveillance-systems-with-metasploit/ • https://www.youtube.com/watch?v=gk8hOrh3MrQ • https://ro.ecu.edu.au/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1202&context=ism Network Penetration Testing, including Wireless networks Below URLs confirms that Metasploit framework support the said. • https://blog.rapid7.com/2009/12/14/meterpreter-pivoting-web-scanning-wireless-and-more/ • https://www.manitonetworks.com/security/2016/8/11/finding-wireless-keys-with-metasploit • https://digi.ninja/metasploit/dns_dhcp.php - MITM using Metasploit • http://www.packetstan.com/2011/03/nbns-spoofing-on-your-way-to-world.html • https://www.irongeek.com/i.php?page=videos/deploying-metasploits-meterpreter-with-mitm-and-an-ettercap-filter - MITM using Metasploit • https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=wifi&t=a • https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=wep&t=a • https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=wpa&t=a • https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=ssid&t=a Would really appreciate your kind guidance and support. Regards Qasim +923172929700

metasploit

Posted by Muhammad Qasim 3 months ago