Metasploit-framework: PAYLOAD linux/armle/mettle/reverse_tcp missing

Created on 26 May 2017  路  2Comments  路  Source: rapid7/metasploit-framework

Steps to reproduce

set PAYLOAD linux/armle/mettle/reverse_tcp

How'd you do it?

  1. ...
  2. ...

This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.

Expected behavior

What should happen?

Current behavior

use exploit/android/browser/stagefright_mp4_tx3g_64bit
set PAYLOAD linux/armle/mettle/reverse_tcp
The value specified for PAYLOAD is not valid.

What happens instead?

You might also want to check the last ~1k lines of
/opt/metasploit/apps/pro/engine/config/logs/framework.log or
~/.msf4/logs/framework.log for relevant stack traces

System stuff

Metasploit version

Framework: 4.14.19-dev
Console : 4.14.19-dev

Get this with the version command in msfconsole (or git log -1 --pretty=oneline for a source install).

I installed Metasploit with:

  • [x] Kali package via apt
  • [ ] Omnibus installer (nightly)
  • [x] Commercial/Community installer (from http://www.rapid7.com/products/metasploit/download.jsp)
  • [ ] Source install (please specify ruby version)

OS

Kali Linux 2017,1
What OS are you running Metasploit on?

Most helpful comment

@JBelinchon
mettle is now known as meterpreter.
set PAYLOAD linux/armle/meterpreter/reverse_tcp

All 2 comments

@JBelinchon
mettle is now known as meterpreter.
set PAYLOAD linux/armle/meterpreter/reverse_tcp

yeah, the mettle name was temporary in metasploit framework, please refer to it as meterpreter if you want a meterpreter prompt. We may add some other protocols later that will have a different name.

Was this page helpful?
0 / 5 - 0 ratings