So I see your browser exploit has refused to attack due to some kind of unmet requirements. Typically this means one of the following:
- Your target doesn’t have the right conditions to be exploited.
- Your target isn’t vulnerable at all.
The exploit should say what requirements are not met. The requirements are explained here:
Key | Description |
---|---|
:source | Target has JavaScript disabled. |
:ua_name | Target isn’t using the preferred browser. For example: Firefox, IE. |
:ua_ver | Target isn’t using the preferred browser version. |
:os_name | Target isn’t using the preferred operating system. |
:os_flavor | This has been deprecated. If you see this, your Metasploit is most likely out of date. |
:language | Target isn’t using the preferred OS language. |
:arch | Target isn’t on the preferred architecture. For example: x86/x64 |
:proxy | Target has a proxy. |
:silverlight | Target doesn’t have Silverlight installed. |
:office | Target doesn’t have the preferred version of Microsoft Office installed, so the exploit cannot bypass DEP. |
:java | Target doesn’t have the preferred version of Java. Often this is used by exploits to bypass DEP. |
:clsid | Target doesn’t have the preferred ActiveX control. If this is the problem, you will only see a mismatch with :activex instead of :clsid. |
:method | Target doesn’t have the preferred ActiveX control. If this is the problem, you will only see a mismatch with :activex instead of :method. |
:mshtml_build | Target isn’t on the preferred build of Internet Explorer. Usually means only specific builds of IE are vulnerable. |
:flash | Target isn’t using the preferred version of Adobe Flash. Often this is used by exploits to leverage code execution. |
:vuln_test | A custom JavaScript-based check. There should be a custom vuln_test_error message explaining why on msfconsole. |
How to manually check requirement comparisons:
If you’d like to check the comparisons, simply set VERBOSE to true. The following is an example:
msf exploit(ms13_022_silverlight_script_object) > set VERBOSE true
VERBOSE => true
msf exploit(ms13_022_silverlight_script_object) > run
[*] Exploit running as background job.
[*] Started reverse handler on 192.168.1.64:4444
[*] Using URL: http://0.0.0.0:8080/SHIzaS2aZxIA6
msf exploit(ms13_022_silverlight_script_object) >
[*] Local IP: http://192.168.1.64:8080/SHIzaS2aZxIA6
[*] Server started.
[*] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Received cookie 'sVfdquJGHzpHyLItxoTgeJI'.
[*] 192.168.1.80 ms13_022_silverlight_script_object - Gathering target information.
[*] 192.168.1.80 ms13_022_silverlight_script_object - Sending response HTML.
[*] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Info receiver page called.
[*] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Received cookie 'ZnKtXOQIvxAclSrEOxJ'.
[!] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Received sniffed browser data over POST:
{"os_name"=>["Microsoft Windows"], "os_flavor"=>["XP"], "ua_name"=>["MSIE"], "ua_ver"=>["8.0"], "arch"=>["x86"], "java"=>["null"], "silverlight"=>["false"], "flash"=>["null"], "office"=>["null"], "mshtml_build"=>["18702"]}.
[*] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Received cookie 'ZnKtXOQIvxAclSrEOxJ'.
[*] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Serving exploit to user with tag ZnKtXOQIvxAclSrEOxJ
[*] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Setting target "ZnKtXOQIvxAclSrEOxJ" to :tried.
[!] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Comparing requirement: source=(?i-mx:script|headers) vs k=script
[!] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Comparing requirement: os_name=Microsoft Windows vs k=Microsoft Windows
[!] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Comparing requirement: ua_name=MSIE vs k=MSIE
[!] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Comparing requirement: silverlight=true vs k=false
[!] 192.168.1.80 ms13_022_silverlight_script_object - 192.168.1.80 ms13_022_silverlight_script_object - Comparing requirement: arch=x86 vs k=x86
[!] 192.168.1.80 ms13_022_silverlight_script_object - Exploit requirement(s) not met: silverlight