Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Won't load. #19178

Open
AnonymousRonin opened this issue May 12, 2024 · 7 comments
Open

Won't load. #19178

AnonymousRonin opened this issue May 12, 2024 · 7 comments
Labels
bug needs-more-information The issue lacks enough detail to replicate/resolve successfully

Comments

@AnonymousRonin
Copy link

Seems as though the slowloris module doesn't load anymore. I checked, there's actually tow files, one a .md file and the one in the module that should load is written in python (.py, not a .rb). I feel like rapid 7 does very little if any maintenance on the free version. Most of the exploit require extensive mods to work, it never uses the assigned lport and it returns strange errors when run against target that have already proven exploitable. I noticed the slowloris code looks a little wonky too, it probably doesn't work out of the box. I think it's safe to say msfconsole has fallen into the category of irrelavent. Especially with tools like burp suite for $500 a year versus the thousands rapid 7 charges. Btw, how come you never load any exploits that actually worked?

@bcoles
Copy link
Contributor

bcoles commented May 12, 2024

the module that should load is written in python

The Python modules are generally less used and less maintained. It is entirely possible the module has a bug.

it returns strange errors

Spooky. It is a mystery. I guess we'll never know.

Especially with tools like burp suite for $500 a year versus the thousands rapid 7 charges.

Different tools. Different purpose. Irrelevant comparison. Metasploit is free.

@adfoster-r7 adfoster-r7 added the needs-more-information The issue lacks enough detail to replicate/resolve successfully label May 12, 2024
Copy link

It looks like there's not enough information to replicate this issue. Please provide any relevant output and logs which may be useful in diagnosing the issue.

This includes:

  • All of the item points within this template
  • The result of the debug command in your Metasploit console
  • Screenshots showing the issues you're having
  • Exact replication steps

The easier it is for us to replicate and debug an issue means there's a higher chance of this issue being resolved.

@adfoster-r7
Copy link
Contributor

The module works for me:

msf6 auxiliary(dos/http/slowloris) > set rhost 127.0.0.1
rhost => 127.0.0.1
msf6 auxiliary(dos/http/slowloris) > set rport 8000
rport => 8000
msf6 auxiliary(dos/http/slowloris) > run

[*] Starting server...
[*] Attacking 127.0.0.1 with 150 sockets
[*] Creating sockets...
[*] Creating socket number 0
[*] Creating socket number 1
...
[*] Creating socket number 150
[*] Sending keep-alive headers... Socket count: 150

Maybe you've got an issue with your specific python configuration, or maybe I don't understand the issue; but without the bug template being filled out - there's not enough detail to investigate further

@nrathaus
Copy link
Contributor

Works for me as well.. I am using default setup of metasploit on Debian 12

@AnonymousRonin
Copy link
Author

AnonymousRonin commented May 18, 2024 via email

@AnonymousRonin
Copy link
Author

AnonymousRonin commented May 18, 2024 via email

@nrathaus
Copy link
Contributor

I booted a fresh Kali (a VDI image from their site) under VirtualBox and had no issue calling
use dos/http/slowloris

It loads and I can use it

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug needs-more-information The issue lacks enough detail to replicate/resolve successfully
Projects
Status: No status
Development

No branches or pull requests

4 participants