Abacus-Group-RTO / legion

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
GNU General Public License v3.0
1.03k stars 170 forks source link

Legion scan crashes in Kali #169

Closed cyrus104 closed 4 years ago

cyrus104 commented 4 years ago

I'm not sure if the issues is in legion or in the vulners.nse output.

warning: failed to load external entity "nmap.xsl" cannot parse nmap.xsl {"time": "2020-04-10 08:22:55,608", "name": "nmap output export to html attempted, but failed.", "level": "ERROR", "data": {"logger_name": "legion"}, "context": {"module": "DefaultNmapExporter", "filename": "DefaultNmapExporter.py", "line": 39}} {"time": "2020-04-10 08:22:55,609", "name": "Could not convert nmap XML to HTML. Try: apt-get install xsltproc", "level": "ERROR", "data": {"logger_name": "legion"}, "context": {"module": "DefaultNmapExporter", "filename": "DefaultNmapExporter.py", "line": 40}} nmap -sV --script=./scripts/nmap/vulners.nse -vvvv 10.10.10.28 -oA /home/kali/.local/share/legion/tmp/legion-0vu_we50-running/nmap/20200410082206587187-nmapstage3 {"time": "2020-04-10 08:22:55,609", "name": "Process 4 is done!", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "controller", "filename": "controller.py", "line": 834}} {"time": "2020-04-10 08:22:55,621", "name": "Storing process output into db: <db.entities.processOutput.process_output object at 0x7f79f07a0450>", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "ProcessRepository", "filename": "ProcessRepository.py", "line": 76}} Processing script obj <parsers.Script.Script object at 0x7f79f07a0510> Processing script obj <parsers.Script.Script object at 0x7f79f07a01d0> -----------------------SCR: http-server-header -----------------------*http-server-header -----------------------SCR: vulners ------------------------VULNERS Refreshing EDBID-CVE mapping. This may take a long time. Killed

cyrus104 commented 4 years ago

I was able to confirm that the requested package, xsltproc, is already installed in Kali.

shotintoeternity commented 4 years ago

I'm experiencing this same issue with the xsltproc package installed as well.

jchoy14 commented 4 years ago

Can you tell me the output from the following commands?

uname -a xsltproc --version

ragebflame commented 4 years ago

Hi, I am experiencing the same issue.

xsltproc --version Using libxml 20910, libxslt 10132 and libexslt 820 xsltproc was compiled against libxml 20904, libxslt 10132 and libexslt 820 libxslt 10132 was compiled against libxml 20904 libexslt 820 was compiled against libxml 20904

uname -a Linux kali 5.5.0-kali2-amd64 #1 SMP Debian 5.5.17-1kali1 (2020-04-21) x86_64 GNU/Linux

n3tl0kr commented 4 years ago

Same here as well.

xsltproc --version Using libxml 20910, libxslt 10132 and libexslt 820
xsltproc was compiled against libxml 20904, libxslt 10132 and libexslt 820
libxslt 10132 was compiled against libxml 20904
libexslt 820 was compiled against libxml 20904

uname -a Linux daemonium 5.4.0-kali3-amd64 #1 SMP Debian 5.4.13-1kali1 (2020-01-20) x86_64 GNU/Linux

sscottgvit commented 4 years ago

The "warning: failed to load external entity "nmap.xsl" cannot parse nmap.xsl" is not going to impact nmap processing. The "--------VULNERS Refreshing EDBID-CVE mapping. This may take a long time. Killed" suggests that it was updating it's vulners database. On slow machines, this can take very long times if the pyExploitDb package is out of date (which ships with predupdated databases to decrease local update time). pyExploitDb was recently updated to fill that update gap. Give it another go.