13o-bbr-bbq / machine_learning_security

Source code about machine learning and security.
1.96k stars 647 forks source link

NMAP #49

Open francoborgia opened 4 years ago

francoborgia commented 4 years ago

Schermata da 2019-10-19 09-38-21

DEPP EXPLOIT GIVES ME THE FOLLOWING PROBLEM. NMAP NO OPEN PORT STRANGE SEEN THAT SCANNING MAKES IT ON A METASPLOITABLE2

miquelangelodias commented 4 years ago

could copy line 2210 and paste after line 2211, then change line 2210 to get 'folder' + 'nmapresult' + env.rhost + '.xml'. folder = pwd from running msfconsole

in line 2226 => nmap_result = os.path.join(self.data_path, 'nmapresult' + env.rhost + '.xml')

image

skyghost66 commented 4 years ago

Hello @miquelangelodias I have the same issue and I can not figure out how to change that code to work,can you provide please how you change that code thank you !

researchlab17 commented 4 years ago

Issue still pending can the fixed code be uploaded into the main repo?

Donald-Su commented 4 years ago

Hi, I have the same issue, did you solve the problem?

francoborgia commented 4 years ago

no I left. if you solve it please let me know

Il Gio 23 Lug 2020, 11:15 Donald Su notifications@github.com ha scritto:

Hi, I have the same issue, did you solve the problem?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/13o-bbr-bbq/machine_learning_security/issues/49#issuecomment-662903068, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5NVFAFSBQM6SIN3OTTR475ULANCNFSM4JCP4RFA .

Donald-Su commented 4 years ago

no I left. if you solve it please let me know Il Gio 23 Lug 2020, 11:15 Donald Su notifications@github.com ha scritto: Hi, I have the same issue, did you solve the problem? — You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub <#49 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5NVFAFSBQM6SIN3OTTR475ULANCNFSM4JCP4RFA .

Hi, I have a question: when you train the Deep Exploit, what are the ip of msf server and deep exploit? or Is the deep exploit and msf on the same host?

francoborgia commented 4 years ago

this machine is ready to work. I was testing it locally with metasploittable. the exploits it should try are all those of mfs.

Il Gio 23 Lug 2020, 14:09 Donald Su notifications@github.com ha scritto:

no I left. if you solve it please let me know Il Gio 23 Lug 2020, 11:15 Donald Su notifications@github.com ha scritto: … <#m-8745593047838880213> Hi, I have the same issue, did you solve the problem? — You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub <#49 (comment) https://github.com/13o-bbr-bbq/machine_learning_security/issues/49#issuecomment-662903068>, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5NVFAFSBQM6SIN3OTTR475ULANCNFSM4JCP4RFA .

Hi, I have a question: when you train the Deep Exploit, what are the ip of msf server and deep exploit? or Is the deep exploit and msf on the same host?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/13o-bbr-bbq/machine_learning_security/issues/49#issuecomment-662970374, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5KK7YYJE26XPAWSJWTR5ASATANCNFSM4JCP4RFA .

bxeno commented 2 years ago

I have raised a PR in the upstream metasploit framework repository to fix this issue. https://github.com/rapid7/metasploit-framework/pull/15941

XUPillar commented 2 years ago

微信截图_20220305120354 how to solve this problem please

sirfabioo commented 7 months ago

@XUPillar Hi, i resolved the issue with reinstalling requirements and tensorflow==1.8.0