Jump to content

[BUG] during Metasploit payload generation.


Bluediamond
 Share

Recommended Posts

3. Metasploit Executable (Good | Gets dinged by most AV | Meterpreter or Standard Shell)
4. No Download Reverse Shell (Great | Long build time)

Option: 3

Would you like a meterpreter or standard shell[ met | std ]?

**whether you choose met or std you get the same ERROR**

Metasploit is generating your payload, this will take a moment...
/usr/bin/simple-ducky: line 5808: msfpayload: command not found
/usr/bin/simple-ducky: line 5808: msfencode: command not found

Encoder Version: v2.6
Simple-Ducky Version: v1.1.1


Link to comment
Share on other sites

What platform are you developing this on? It says that it can't find the MSFPayload and the MSFEncode files. These two files are part of the metasploit suite, meaning you need to use an operating system such as Kali Linux that has the metasploit suite already installed. It is hard to compile this on any other platform other than Kali, so I suggest you make a virtual machine with Kali Linux, and then try compiling the duckyscript.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...