Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
Linux k21 5.15.0-kali2-amd64 #1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux
Legion last version from git 11/02/2022 ver 0.3.8-1622657874
-oA ./tmp/legion-nato5awb-running/nmap/20220211100031722541-nmapstage3
{"time": "2022-02-11 10:01:19,620", "name": "Process 76 is done!", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "controller", "filename": "controller.py", "line": 839}}
Processing service result name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing=
Did not find service name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing=
Processing service result name=ident prod= ver= extra= fing=
Did not find service name=ident prod= ver= extra= fing=
Processing script obj <parsers.Script.Script object at 0x7fbd652b2a60>
-----------------------SCR: vulners
------------------------VULNERS
Loading database...
Traceback (most recent call last):
File "/root/tools/legion/app/importers/NmapImporter.py", line 283, in run
scrProcessorResults = scr.scriptSelector(db_host)
File "/root/tools/legion/parsers/Script.py", line 122, in scriptSelector
cveResults = self.getCves()
File "/root/tools/legion/parsers/Script.py", line 96, in getCves
cvesResults = self.processVulnersScriptOutput(cveOutput)
File "/root/tools/legion/parsers/Script.py", line 66, in processVulnersScriptOutput
resultCpeDetails['version'] = resultCpeData[4]
IndexError: list index out of range
./startLegion.sh: line 38: 2172947 Aborted /usr/bin/env python3 legion.py
Hi,
Linux k21 5.15.0-kali2-amd64 #1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux
Legion last version from git 11/02/2022 ver 0.3.8-1622657874
-oA ./tmp/legion-nato5awb-running/nmap/20220211100031722541-nmapstage3 {"time": "2022-02-11 10:01:19,620", "name": "Process 76 is done!", "level": "INFO", "data": {"logger_name": "legion"}, "context": {"module": "controller", "filename": "controller.py", "line": 839}} Processing service result name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing= Did not find service name=domain prod=ISC BIND ver=9.11.4-P2 extra=RedHat Enterprise Linux 7 fing= Processing service result name=ident prod= ver= extra= fing= Did not find service name=ident prod= ver= extra= fing= Processing script obj <parsers.Script.Script object at 0x7fbd652b2a60> -----------------------SCR: vulners ------------------------VULNERS Loading database... Traceback (most recent call last): File "/root/tools/legion/app/importers/NmapImporter.py", line 283, in run scrProcessorResults = scr.scriptSelector(db_host) File "/root/tools/legion/parsers/Script.py", line 122, in scriptSelector cveResults = self.getCves() File "/root/tools/legion/parsers/Script.py", line 96, in getCves cvesResults = self.processVulnersScriptOutput(cveOutput) File "/root/tools/legion/parsers/Script.py", line 66, in processVulnersScriptOutput resultCpeDetails['version'] = resultCpeData[4] IndexError: list index out of range ./startLegion.sh: line 38: 2172947 Aborted /usr/bin/env python3 legion.py
Please just let me know if more info is needed.
thks!