Closed v3nom1 closed 8 years ago
Hi. Make sure you use latest version of EAST. I need more info about all actions you done. What kind of OS is used? Arch? Show this video to see how it works: https://vimeo.com/146083749
Hi, I am using the latest version of east. The target OS is windows xp sp3 32 bit. I am running EAST on windows 8 64 bit. I am trying to run the two exploits from the GUI. The exploits are executed but there is no reverse connection. For example
The ef_easyfile_webserver_sbo exploit crashes the server but there is no reverse connection. Although I have enabled reverse connection. Same is the case with symantec exploit. There is no reverse connection. In case of symantec exploit the exception is thrown that is shown in the screenshot above
Hi, venom141! Can you check ef_easyfile_webserver_sbo exploit? (I'm update it)
Hi, steperdin. I have tried the new code still no reverse shell. I am sending you the screenshots
In the python console here is the output
Okay. The issue with ef_easyfile_webserver is resolved. Somehow if I run EAST on windows 8.1 there is no reverse connection but on windows 7 its running. Target is windows xp sp3 in both cases
I have tried the rce exploits but I was unable to get reverse connection in anyone of them. For example it gave a WebSocketConnectionClosedException in symantec_pcanywhere exploit although on the UI it says successfully executed.
In the case of easyfile_webserver_sbo the is no reverse connection as well. No logs no errors and no connection.