Metasploit-framework: rhosts file not working in auxiliary admin module

Created on 2 Mar 2019  路  8Comments  路  Source: rapid7/metasploit-framework

hi i have kali 2019.1 my problem its rhosts file in auxiliary/admin/smb/ms17_010_command not working

`msf5 auxiliary(admin/smb/ms17_010_command) > set RHOSTS file:/root/Desktop/IPs.txt
RHOSTS => file:/root/Desktop/IPs.txt
msf5 auxiliary(admin/smb/ms17_010_command) > exploit
[*] Auxiliary module execution completed

bug

Most helpful comment

With latest master this is working as expected. Thanks for the report @zecopro, a new release should get tagged tomorrow at 12 CST.

msf5 auxiliary(admin/smb/ms17_010_command) > cat /home/bcook/projects/metasploit-framework/ips.txt
[*] exec: cat /home/bcook/projects/metasploit-framework/ips.txt

127.0.0.1

msf5 auxiliary(admin/smb/ms17_010_command) > set rhosts file:///home/bcook/projects/metasploit-framework/ips.txt
rhosts => file:///home/bcook/projects/metasploit-framework/ips.txt
msf5 auxiliary(admin/smb/ms17_010_command) > run

[-] 127.0.0.1:445         - Rex::ConnectionRefused: The connection was refused by the remote host (127.0.0.1:445).
[*] 127.0.0.1:445         - Scanned 1 of 1 

All 8 comments

This issue has probably been resolved in #11493

Please update your Metasploit.

This issue has probably been resolved in #11493

Please update your Metasploit.

I update to her but the same problem

msfupdate
Updating package cache..OK
Checking for and installing update..
Reading package lists... Done
Building dependency tree
Reading state information... Done
metasploit-framework is already the newest version (5.0.10+20190301142651~1rapid7-1).
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

You're correct. I was able to reproduce this issue. Looks like this is another bug.

msf5 auxiliary(admin/smb/ms17_010_command) > set rhosts file:///root/ips.txt
rhosts => file:///root/ips.txt
msf5 auxiliary(admin/smb/ms17_010_command) > cat /root/ips.txt
[*] exec: cat /root/ips.txt

127.0.0.1
msf5 auxiliary(admin/smb/ms17_010_command) > run
[*] Auxiliary module execution completed
msf5 auxiliary(admin/smb/ms17_010_command) > 

cc @busterb

Thanks, taking a look now.

With latest master this is working as expected. Thanks for the report @zecopro, a new release should get tagged tomorrow at 12 CST.

msf5 auxiliary(admin/smb/ms17_010_command) > cat /home/bcook/projects/metasploit-framework/ips.txt
[*] exec: cat /home/bcook/projects/metasploit-framework/ips.txt

127.0.0.1

msf5 auxiliary(admin/smb/ms17_010_command) > set rhosts file:///home/bcook/projects/metasploit-framework/ips.txt
rhosts => file:///home/bcook/projects/metasploit-framework/ips.txt
msf5 auxiliary(admin/smb/ms17_010_command) > run

[-] 127.0.0.1:445         - Rex::ConnectionRefused: The connection was refused by the remote host (127.0.0.1:445).
[*] 127.0.0.1:445         - Scanned 1 of 1 

Appreciate it! Best bug is one that's already fixed!

thanks for your help @busterb

Was this page helpful?
0 / 5 - 0 ratings