Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[!] API Fire Error: execution expired in {:owner=>BeEF::Extension::Metasploit::API::MetasploitHooks, :id=>22}.post_soft_load() #1322

Closed
kalifan opened this issue Nov 24, 2016 · 14 comments

Comments

@kalifan
Copy link

kalifan commented Nov 24, 2016

i download the last version of beef, 0.4.7.0-alpha and this is the first time i get this error, how could i fix it?

[22:47:41][] Bind socket [imapeudora1] listening on [0.0.0.0:2000].
[22:47:41][
] Browser Exploitation Framework (BeEF) 0.4.7.0-alpha
[22:47:41] | Twit: @beefproject
[22:47:41] | Site: http://beefproject.com
[22:47:41] | Blog: http://blog.beefproject.com
[22:47:41] |_ Wiki: https://github.com/beefproject/beef/wiki
[22:47:41][] Project Creator: Wade Alcorn (@wadealcorn)
[22:47:41][
] Connecting to Metasploit on 192.168.0.106:55552
[22:47:52][!] API Fire Error: execution expired in {:owner=>BeEF::Extension::Metasploit::API::MetasploitHooks, :id=>22}.post_soft_load()
[22:47:52][] BeEF is loading. Wait a few seconds...
[22:47:54][
] 13 extensions enabled.
[22:47:54][] 278 modules enabled.
[22:47:54][
] 2 network interfaces were detected.
[22:47:54][+] running on network interface: 127.0.0.1
[22:47:54] | Hook URL: http://127.0.0.1:3000/hook.js
[22:47:54] |_ UI URL: http://127.0.0.1:3000/ui/panel
[22:47:54][+] running on network interface: 192.168.0.106
[22:47:54] | Hook URL: http://192.168.0.106:3000/hook.js
[22:47:54] |_ UI URL: http://192.168.0.106:3000/ui/panel
[22:47:54][] RESTful API key: 0036a83fb2cb68f4b75cc1578029fb1b6f5bb38b
[22:47:54][
] HTTP Proxy: http://127.0.0.1:6789
[22:47:54][*] BeEF server started (press control+c to stop)

@bcoles
Copy link
Collaborator

bcoles commented Nov 24, 2016

Hi @kalifan

Try cloning the latest version from GitHub.

@kalifan
Copy link
Author

kalifan commented Nov 24, 2016

ok, trying with this https://github.com/beefproject/beef.git

git clone https://github.com/beefproject/beef.git

this is what i need to do? i will try. after i tell you thanks

@kalifan
Copy link
Author

kalifan commented Nov 24, 2016

I have another question, older metasploit modules must be loaded in this path path: '/usr/share/metasploit-framework/ ?

@kalifan
Copy link
Author

kalifan commented Nov 25, 2016

i dont know what is wrong,? i following the instruction for install beef. in the older version i never get an error, the problem it is when beef try to login with metasploit. i change the user and password and keep going the problem. in this section
beef/extensions/metasploit/config.yaml

beef:
extension:
metasploit:
name: 'Metasploit'
enable: true
# Metasploit msgrpc connection options
host: "127.0.0.1"
port: 55552
user: "msf" <................... here
pass: "abc123" <................. here
uri: '/api'
ssl: true
ssl_version: 'TLS1'
ssl_verify: true
# Public connect back host IP address for victim connections to Metasploit
callback_host: "127.0.0.1"
# URIPATH from Metasploit Browser AutoPwn server module
autopwn_url: "autopwn"
# Start msfrpcd automatically with BeEF
auto_msfrpcd: false
auto_msfrpcd_timeout: 120
msf_path: [
{os: 'osx', path: '/opt/local/msf/'},
{os: 'livecd', path: '/opt/metasploit-framework/'},
{os: 'bt5r3', path: '/opt/metasploit/msf3/'},
{os: 'bt5', path: '/opt/framework3/msf3/'},
{os: 'backbox', path: '/opt/backbox/msf/'},
{os: 'kali', path: '/usr/share/metasploit-framework/'},
{os: 'pentoo', path: '/usr/lib/metasploit'},
{os: 'win', path: 'c:\metasploit-framework\'},
{os: 'custom', path: ''}

@bcoles
Copy link
Collaborator

bcoles commented Nov 25, 2016

Make sure you're starting Metasploit RPC with SSL=y as per the FAQ.

@SiNaPsEr0x
Copy link

SiNaPsEr0x commented Nov 25, 2016

fix with correct ssl_version: 'TLS1'

@kalifan
Copy link
Author

kalifan commented Nov 26, 2016

well after effort so much i can loaded the metasploit in beef. i just put false for true.

2016-11-25_232948
2016-11-25_233158
2016-11-25_233616

is it important configure to SSL=true?

LOL error i cant i mean in the image.

@SiNaPsEr0x
Copy link

I dont know... but Y is ok

@gmojo02
Copy link

gmojo02 commented Dec 20, 2016

Installing bundle install with non root user worked for mr

@bcoles
Copy link
Collaborator

bcoles commented Apr 10, 2017

Hi @kalifan

Using SSL=true is important to protect from sniffing and MitM. It's less important if you're using 127.0.0.1.

Regarding the browser image, modern browsers are updated monthly. It's likely that support for the latest version of the hooked browser had not been added at the time of hook.

Is everything working now? Can I close this issue?

@bcoles bcoles self-assigned this Apr 10, 2017
@bcoles bcoles closed this as completed Apr 16, 2017
@gertel86
Copy link

gertel86 commented Jun 3, 2017

Hello friends I have the same problem, I have read your comments of placing ssl = false and ssl_verify = false also does not come out, I put both in true, and I get nothing.

extension:
metasploit:
name: 'Metasploit'
enable: true
host: "127.0.0.1"
port: 55552
user: "msf"
pass: "abc123"
uri: '/api'
# if you need "ssl: true" make sure you start msfrpcd with "SSL=y", like:
# load msgrpc ServerHost=IP Pass=abc123 SSL=y
ssl: false
ssl_version: 'TLSv1'
ssl_verify: false
callback_host: "192.168.1.8"
autopwn_url: "autopwn"
auto_msfrpcd: false
auto_msfrpcd_timeout: 120
msf_path: [
{os: 'osx', path: '/opt/local/msf/'},
{os: 'livecd', path: '/opt/metasploit-framework/'},
{os: 'bt5r3', path: '/opt/metasploit/msf3/'},
{os: 'bt5', path: '/opt/framework3/msf3/'},
{os: 'backbox', path: '/opt/backbox/msf/'},
{os: 'kali', path: '/usr/share/metasploit-framework/'},
{os: 'pentoo', path: '/usr/lib/metasploit'},
{os: 'win', path: 'c:\metasploit-framework\'},
{os: 'custom', path: ''}
]

@newdie484
Copy link

msf_path: [
{os: 'osx', path: '/opt/local/msf/'},
{os: 'livecd', path: '/opt/metasploit-framework/'},
{os: 'bt5r3', path: '/opt/metasploit/msf3/'},
{os: 'bt5', path: '/opt/framework3/msf3/'},
{os: 'backbox', path: '/opt/backbox/msf/'},
{os: 'kali', path: '/usr/share/metasploit-framework/'},
{os: 'pentoo', path: '/usr/lib/metasploit'},
{os: 'custom', path: ''}
]
my metasploit is /home/redeye/metasploit-framework
how to config that??

@bcoles
Copy link
Collaborator

bcoles commented Apr 6, 2018

@newdie484

msf_path: [
  {os: 'custom', path: '/home/redeye/metasploit-framework/'}
]

Be aware that this functionality may or may not be broken.

@q2dg
Copy link

q2dg commented Apr 23, 2018

See #1106 (comment) to solve the problem

@bcoles bcoles removed their assignment Feb 19, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

7 participants