13o-bbr-bbq / machine_learning_security

Source code about machine learning and security.
1.96k stars 645 forks source link

DeepExploit issue #50

Open skyghost66 opened 4 years ago

skyghost66 commented 4 years ago

hello im coming across DeepExploit and i need some help if its still here the admin, after ruining the Exploit i have issue like [] Start time: 2019/10/31 16:52:58 [] Port scanning: 192.168.1.247 [Elapsed time: 0 s] [] Executing keep_alive.. [] End time : 2019/10/31 16:53:03 [+] Get port list from /root/nmap_result_192.168.1.247.xml. [!] No open port. [!] Shutdown Deep Exploit..

AFTER changing some files

nmap_result += ret.get(b'data').decode('utf-8')

        #        status = ret.get(b'busy')
        #        if status is False:
        #            break
                with open(nmap_result_file) as fi:
                    nmap_result = fi.read()

i WAS able to READ THE NMAP FILES , BUT I HAVE A ISSUE AGAIN LIKE [] Getting 21/tcp info: unknown [] Getting 22/tcp info: unknown [] Getting 23/tcp info: unknown [] Getting 25/tcp info: unknown [] Getting 53/tcp info: unknown [] Getting 80/tcp info: unknown [] Getting 111/tcp info: unknown [] Getting 139/tcp info: unknown [] Getting 445/tcp info: unknown [] Getting 512/tcp info: unknown [] Getting 513/tcp info: unknown [] Getting 514/tcp info: unknown [] Getting 1099/tcp info: unknown [] Getting 1524/tcp info: unknown [] Getting 2049/tcp info: unknown [] Getting 2121/tcp info: unknown [] Getting 3306/tcp info: unknown [] Getting 5432/tcp info: unknown [] Getting 5900/tcp info: unknown [] Getting 6000/tcp info: unknown [] Getting 6667/tcp info: unknown [] Getting 8180/tcp info: unknown [+] Get exploit list. [*] Loading exploit list from Metasploit. [-] MsfRPC: Not Authenticated.

HOW CAN I DO THIS TO WORKS , IM CONNECTED TO THE MSF CONSOLE AND IM RUINING THE RPC SERVER!!! SOME HELP SHALL BE GREAT , THANK YOU~!