New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Won't load. #19178
Comments
The Python modules are generally less used and less maintained. It is entirely possible the module has a bug.
Spooky. It is a mystery. I guess we'll never know.
Different tools. Different purpose. Irrelevant comparison. Metasploit is free. |
It looks like there's not enough information to replicate this issue. Please provide any relevant output and logs which may be useful in diagnosing the issue. This includes:
The easier it is for us to replicate and debug an issue means there's a higher chance of this issue being resolved. |
The module works for me:
Maybe you've got an issue with your specific python configuration, or maybe I don't understand the issue; but without the bug template being filled out - there's not enough detail to investigate further |
Works for me as well.. I am using default setup of metasploit on Debian 12 |
Yeah, I'm using a brand new install of Kali. But I actually found that particular exploit works better being deployed outside of metasploit so it's a mute point now.
Sent from Proton Mail mobile
…-------- Original Message --------
On May 14, 2024, 11:28 AM, Noam Rathaus wrote:
Works for me as well.. I am using default setup of metasploit on Debian 12
—
Reply to this email directly, [view it on GitHub](#19178 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/A7I7NMSCJUMH32R7U3GMHXLZCJJUVAVCNFSM6AAAAABHSLKDU2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCMJQHA2TOMRZHE).
You are receiving this because you authored the thread.Message ID: ***@***.***>
|
Like I said, the module won't even load. It's a brand new install of kali. I'm gonna spin up a vm and see what happens.
Sent from Proton Mail mobile
…-------- Original Message --------
On May 12, 2024, 4:48 AM, adfoster-r7 wrote:
The module works for me:
msf6 auxiliary(dos/http/slowloris) > set rhost 127.0.0.1
rhost => 127.0.0.1
msf6 auxiliary(dos/http/slowloris) > set rport 8000
rport => 8000
msf6 auxiliary(dos/http/slowloris) > run
[*] Starting server...
[*] Attacking 127.0.0.1 with 150 sockets
[*] Creating sockets...
[*] Creating socket number 0
[*] Creating socket number 1
...
[*] Creating socket number 150
[*] Sending keep-alive headers... Socket count: 150
Maybe you've got an issue with your specific python configuration, or maybe I don't understand the issue; but without the bug template being filled out - there's not enough detail to investigate further
—
Reply to this email directly, [view it on GitHub](#19178 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/A7I7NMWAIZN3ZN6NJEAZ3VTZB5JHFAVCNFSM6AAAAABHSLKDU2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCMBWGIYTSMRRGA).
You are receiving this because you authored the thread.Message ID: ***@***.***>
|
I booted a fresh Kali (a VDI image from their site) under VirtualBox and had no issue calling It loads and I can use it |
Seems as though the slowloris module doesn't load anymore. I checked, there's actually tow files, one a .md file and the one in the module that should load is written in python (.py, not a .rb). I feel like rapid 7 does very little if any maintenance on the free version. Most of the exploit require extensive mods to work, it never uses the assigned lport and it returns strange errors when run against target that have already proven exploitable. I noticed the slowloris code looks a little wonky too, it probably doesn't work out of the box. I think it's safe to say msfconsole has fallen into the category of irrelavent. Especially with tools like burp suite for $500 a year versus the thousands rapid 7 charges. Btw, how come you never load any exploits that actually worked?
The text was updated successfully, but these errors were encountered: