C0reL0ader / EaST

Exploits and Security Tools Framework 2.0.1
http://eastfw.net/
304 stars 112 forks source link

Reverse connection issue #2

Closed v3nom1 closed 8 years ago

v3nom1 commented 8 years ago

I have tried the rce exploits but I was unable to get reverse connection in anyone of them. For example it gave a WebSocketConnectionClosedException in symantec_pcanywhere exploit although on the UI it says successfully executed.

In the case of easyfile_webserver_sbo the is no reverse connection as well. No logs no errors and no connection.

capture

C0reL0ader commented 8 years ago

Hi. Make sure you use latest version of EAST. I need more info about all actions you done. What kind of OS is used? Arch? Show this video to see how it works: https://vimeo.com/146083749

v3nom1 commented 8 years ago

Hi, I am using the latest version of east. The target OS is windows xp sp3 32 bit. I am running EAST on windows 8 64 bit. I am trying to run the two exploits from the GUI. The exploits are executed but there is no reverse connection. For example

The ef_easyfile_webserver_sbo exploit crashes the server but there is no reverse connection. Although I have enabled reverse connection. Same is the case with symantec exploit. There is no reverse connection. In case of symantec exploit the exception is thrown that is shown in the screenshot above

capture1 capture2

ghost commented 8 years ago

Hi, venom141! Can you check ef_easyfile_webserver_sbo exploit? (I'm update it)

v3nom1 commented 8 years ago

Hi, steperdin. I have tried the new code still no reverse shell. I am sending you the screenshots

image

In the python console here is the output

image

v3nom1 commented 8 years ago

Okay. The issue with ef_easyfile_webserver is resolved. Somehow if I run EAST on windows 8.1 there is no reverse connection but on windows 7 its running. Target is windows xp sp3 in both cases