New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Post Module (gnome_keyring_dump) - stdapi_railgun_api error. #8479

Open
upgoingstar opened this Issue May 29, 2017 · 4 comments

Comments

Projects
None yet
5 participants
@upgoingstar

upgoingstar commented May 29, 2017

Steps to reproduce

Gain a linux meterpreter shell on a x86/x64 bit linux box.
How'd you do it?

  1. Took a meterpreter session on linux box using msfvenom - elf type payload.
  2. Used meterpreter to run the gnome_keyring_dump module.

Expected behavior

Should have executed the post module without error and dump gnome keys.

Current behavior

Throwing an error.

meterpreter > sysinfo
Computer : 192.168.1.108
OS : Kali kali-rolling (Linux 4.9.0-kali3-amd64)
Architecture : x64
Meterpreter : x64/linux
meterpreter > run post/linux/gather/gnome_keyring_dump

[-] Post failed: Rex::Post::Meterpreter::RequestError stdapi_railgun_api: Operation failed: 1
[-] Call stack:
[-] /usr/local/share/metasploit-framework-master/lib/rex/post/meterpreter/extensions/stdapi/railgun/dll.rb:266:in process_function_call' [-] /usr/local/share/metasploit-framework-master/lib/rex/post/meterpreter/extensions/stdapi/railgun/dll.rb:84:incall_function'
[-] /usr/local/share/metasploit-framework-master/lib/rex/post/meterpreter/extensions/stdapi/railgun/dll_wrapper.rb:24:in method_missing' [-] /usr/local/share/metasploit-framework-master/modules/post/linux/gather/gnome_keyring_dump.rb:195:inrun'

System stuff

Metasploit version -

metasploit v4.14.22-dev

I installed Metasploit with:

  • Source install (please specify ruby version)
    ruby 2.4.1p111 (2017-03-22 revision 58053) [x86_64-darwin16]

OS

MacOS Sierra

@upgoingstar

This comment has been minimized.

Show comment
Hide comment
@upgoingstar

upgoingstar May 29, 2017

Looks like I was trying with wrong meterpreter, this works with python meterpreter only.

upgoingstar commented May 29, 2017

Looks like I was trying with wrong meterpreter, this works with python meterpreter only.

@void-in

This comment has been minimized.

Show comment
Hide comment
@void-in

void-in May 30, 2017

Contributor

Re-opening since this is an issue with the native meterpreter. IIRC the railgun API is only available on the python meterpreter at the moment so the platform of the module should be changed from linux to python. /cc @zeroSteiner

Contributor

void-in commented May 30, 2017

Re-opening since this is an issue with the native meterpreter. IIRC the railgun API is only available on the python meterpreter at the moment so the platform of the module should be changed from linux to python. /cc @zeroSteiner

@Hyperion101010

This comment has been minimized.

Show comment
Hide comment
@Hyperion101010

Hyperion101010 Oct 7, 2018

hi there i am an undergrad in computer science , i am looking forward to contribute for metasploit
what is there to contribute in for this bug ,can i help ?

Hyperion101010 commented Oct 7, 2018

hi there i am an undergrad in computer science , i am looking forward to contribute for metasploit
what is there to contribute in for this bug ,can i help ?

@h00die

This comment has been minimized.

Show comment
Hide comment
@h00die

h00die Oct 7, 2018

Contributor

Absolutely! While Rapid7 owns the project and has a bunch of developers that do much of the main work, LOTS of the code is from volunteers (like myself). Check out the awesome docs on how to get started here: https://github.com/rapid7/metasploit-framework/wiki/Contributing-to-Metasploit

If you need further help, check the IRC channel.

Contributor

h00die commented Oct 7, 2018

Absolutely! While Rapid7 owns the project and has a bunch of developers that do much of the main work, LOTS of the code is from volunteers (like myself). Check out the awesome docs on how to get started here: https://github.com/rapid7/metasploit-framework/wiki/Contributing-to-Metasploit

If you need further help, check the IRC channel.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment