Armitage Metasploit BackTrack 4 No Collaboration server is present
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Armitage Metasploit BackTrack 4 No Collaboration server is present
Hi,
I am using BackTrack 4 RC 2, Metasploit and Armitage. I am not able to see my target computers in the target area of the Armitage application after performing an Nmap quick scan (OS detect) on my wireless network (I have several computers connected to the wireless network). Furthermore, I got the following warnings when trying to do the Nmap quick scan (OS detect):
Quote:
Warning: No collaboration server is present! at collaborate.sl:48
Warning: Writing to: /opt/metasploit3/msf3 at armitage.sl:169
Warning: refreshTargets was called at targets.sl:429
Warning: refreshTargets was called at targets.sl:429
Warning: refreshTargets was called at targets.sl:429
Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed
You don't appear to have made a lot of posts to LQ, but you have been a member for almost three years. You should be aware by now that LQ does not discuss this type of activity.
You don't appear to have made a lot of posts to LQ, but you have been a member for almost three years. You should be aware by now that LQ does not discuss this type of activity.
Thread Reported.
Thanks for your reply.
I've finally installed Linux on my harddrive last week after all these years of procastinating and I now use it everyday.
Sorry if the question is innappropriate for this subsection
I've finally installed Linux on my harddrive last week after all these years of procastinating and I now use it everyday.
I am pleased that Linux is proving to be a positive experience for you. Linux security is definitely a fascinating topic and in my opinion LQ is one of the premier sites regarding information on Linux security. Our focus, though, is on prevention, protection, and when the need arises a postmortem analysis of systems. Penetration testing is a gray area and the policy is to err on the side of caution to protect the reputation of LQ as an organization. While you may be using these tools for their legitimate purpose, LQ has no guarantee that this is how they will be used and the information could be used by someone else for nefarious purposes. My advice would be that if you need help with performing penetration testing on your systems that you consult the Backtrac documentation and forums. Then if your testing shows weaknesses that you would like help addressing, we would be more than happy to assist with the hardening process and actually be grateful for the educational opportunity.
As far as performing a scan of your system, be aware that Metasploit is very capable of "breaking things" in the process of performing its actions. You may be better off with a tool such as Nessus, Qualys, or OpenVAS, which aren't as aggressive and uses authentication to "open the door" as opposed to breaking it down.
Warning: No collaboration server is present! at collaborate.sl:48
Warning: Writing to: /opt/metasploit3/msf3 at armitage.sl:169
Warning: refreshTargets was called at targets.sl:429
Warning: refreshTargets was called at targets.sl:429
Warning: refreshTargets was called at targets.sl:429
What do these warnings mean?
No idea, and I second what Noway2 wrote about the Backtrack documentation and forums.
Else poll the Armitage developers. A mailing list may be available at their site.
As for the pentesting part I do hope you understand that, as Noway2 wrote, we have no proof if your listed LAN range is your own or a 'net owned by others and that we therefore decline accepting such questions as valid for LQ. Thread closed. Feel free to email me if anything was unclear.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.