Hello, I have Kali Linux 64-bit on VMware Player 14 and Windows Server 2016 Host. I scanned my target with Rapid7 Nexpose (or InsightVM) and found a Vulnerability. Now, I'm in Kali VM with Metasploit. After navigating to "use auxiliary/scanner/ntp/ntp_unsettrap_dos" I enter in the RHOST and run. I get the error: Auxiliary failed: NoMethodError undefined method `size' for #<Rex:roto::NTP::NTPControl:0x0055d6437416b0> Does anyone know how I can fix this problem? I don't know what 'size' is. I tried "set NUM 0" but I got the same error. "Show options" shows: msf auxiliary(ntp_unsettrap_dos) > show options Module options (auxiliary/scanner/ntp/ntp_unsettrap_dos): Name Current Setting Required Description BATCHSIZE 256 yes The number of hosts to probe in each set FILTER no The filter string for capturing traffic INTERFACE no The name of the interface PCAPFILE no The name of the PCAP capture file to process RHOSTS X.X.X.X yes The target address range or CIDR identifier RPORT 123 yes The target port (UDP) SNAPLEN 65535 yes The number of bytes to capture THREADS 16 yes The number of concurrent threads TIMEOUT 100000000 yes The number of seconds to wait for new data I obvisouly marked out the RHOSTS. Can anyone help me with this error so I can run Metasploit? Please reply. Thanks!
I also get this in the errors...I've tried using Metasploit Community, Metasploit Framework on Kali, and Armitage. All get this same error. Any ideas? Call stack: [-] /usr/share/metasploit-framework/lib/msf/core/auxiliary/drdos.rb:45:in `map' [-] /usr/share/metasploit-framework/lib/msf/core/auxiliary/drdos.rb:45:in `block in prove_amplification' [-] /usr/share/metasploit-framework/lib/msf/core/auxiliary/drdos.rb:30:in `each' [-] /usr/share/metasploit-framework/lib/msf/core/auxiliary/drdos.rb:30:in `prove_amplification' [-] /usr/share/metasploit-framework/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb:62:in `block in scanner_postscan' [-] /usr/share/metasploit-framework/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb:51:in `each' [-] /usr/share/metasploit-framework/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb:51:in `scanner_postscan' [-] /usr/share/metasploit-framework/lib/msf/core/auxiliary/udp_scanner.rb:100:in `run_batch' [-] /usr/share/metasploit-framework/lib/msf/core/auxiliary/scanner.rb:215:in `block in run' [-] /usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:100:in `block in spawn'
Hi, I talked to someone who says it looks like Ruby is the problem. Should I try reinstalling Metasploit framework? I think my Anti Virus has taken of Ruby.exe from my Metasploit Community GUI. But that's not on my Kali VM. Any ideas?