You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
root@kali:/tmp/viproy-voipkit-master# ./kaliinstall.sh
You can execute msfconsole now.
Viproy modules placed under auxiliary/voip/viproy*
Reading package lists... Done
Building dependency tree
Reading state information... Done
libpcap-dev is already the newest version (1.8.1-6).
0 upgraded, 0 newly installed, 0 to remove and 249 not upgraded.
Building native extensions. This could take a while...
Successfully installed pcaprub-0.13.0
Parsing documentation for pcaprub-0.13.0
Done installing documentation for pcaprub after 0 seconds
1 gem installed
root@kali:/tmp/viproy-voipkit-master# msfconsole
[-] ***rting the Metasploit Framework console...
[-] * WARNING: No database support: could not connect to server: Connection refused
Is the server running on host "localhost" (::1) and accepting
TCP/IP connections on port 5432?
could not connect to server: Connection refused
Is the server running on host "localhost" (127.0.0.1) and accepting
TCP/IP connections on port 5432?
[-] ***
Traceback (most recent call last):ork console...|
30: from /usr/bin/msfconsole:49:in <main>' 29: from /usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in start'
28: from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in start' 27: from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in driver'
26: from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in new' 25: from /usr/share/metasploit-framework/lib/msf/ui/console/driver.rb:161:in initialize'
24: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in init_module_paths' 23: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in each'
22: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in block in init_module_paths' 21: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in add_module_path'
20: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in each' 19: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in block in add_module_path'
18: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in load_modules' 17: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in each'
16: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in block in load_modules' 15: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:238:in load_modules'
14: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:30:in each_module_reference_name' 13: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:30:in foreach'
12: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:40:in block in each_module_reference_name' 11: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:132:in find'
10: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:132:in catch' 9: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:133:in block in find'
8: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:49:in block (2 levels) in each_module_reference_name' 7: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:239:in block in load_modules'
6: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:177:in load_module' 5: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:543:in namespace_module_transaction'
4: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:365:in current_module' 3: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:365:in reduce'
2: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:365:in each' 1: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:370:in block in current_module'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:380:in `rescue in block in current_module': auxiliary/voip/viproy_sip-invite-sdptest must be lowercase alphanumeric snake case (Msf::ModuleLoadError)
root@kali:/tmp/viproy-voipkit-master#
The text was updated successfully, but these errors were encountered:
root@kali:/tmp/viproy-voipkit-master# ./kaliinstall.sh
You can execute msfconsole now.
Viproy modules placed under auxiliary/voip/viproy*
Reading package lists... Done
Building dependency tree
Reading state information... Done
libpcap-dev is already the newest version (1.8.1-6).
0 upgraded, 0 newly installed, 0 to remove and 249 not upgraded.
Building native extensions. This could take a while...
Successfully installed pcaprub-0.13.0
Parsing documentation for pcaprub-0.13.0
Done installing documentation for pcaprub after 0 seconds
1 gem installed
root@kali:/tmp/viproy-voipkit-master# msfconsole
[-] ***rting the Metasploit Framework console...
[-] * WARNING: No database support: could not connect to server: Connection refused
Is the server running on host "localhost" (::1) and accepting
TCP/IP connections on port 5432?
could not connect to server: Connection refused
Is the server running on host "localhost" (127.0.0.1) and accepting
TCP/IP connections on port 5432?
[-] ***
Traceback (most recent call last):ork console...|
30: from /usr/bin/msfconsole:49:in
<main>' 29: from /usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in
start'28: from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in
start' 27: from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in
driver'26: from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in
new' 25: from /usr/share/metasploit-framework/lib/msf/ui/console/driver.rb:161:in
initialize'24: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in
init_module_paths' 23: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in
each'22: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in
block in init_module_paths' 21: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in
add_module_path'20: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in
each' 19: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in
block in add_module_path'18: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in
load_modules' 17: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in
each'16: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in
block in load_modules' 15: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:238:in
load_modules'14: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:30:in
each_module_reference_name' 13: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:30:in
foreach'12: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:40:in
block in each_module_reference_name' 11: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:132:in
find'10: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:132:in
catch' 9: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:133:in
block in find'8: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:49:in
block (2 levels) in each_module_reference_name' 7: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:239:in
block in load_modules'6: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:177:in
load_module' 5: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:543:in
namespace_module_transaction'4: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:365:in
current_module' 3: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:365:in
reduce'2: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:365:in
each' 1: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:370:in
block in current_module'/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:380:in `rescue in block in current_module': auxiliary/voip/viproy_sip-invite-sdptest must be lowercase alphanumeric snake case (Msf::ModuleLoadError)
root@kali:/tmp/viproy-voipkit-master#
The text was updated successfully, but these errors were encountered: