infobyte / faraday

Open Source Vulnerability Management Platform
https://www.faradaysec.com
GNU General Public License v3.0
5.08k stars 919 forks source link

MAC OSX 10.11.6 error #120

Closed hktalent closed 8 years ago

hktalent commented 8 years ago

sudo ./install.sh Password: [+] Install Darwin 15.6.0 x86_64 ./install.sh: line 56: apt-get: command not found ./install.sh: line 60: apt-get: command not found Traceback (most recent call last): File "/usr/local/bin/pip2", line 9, in load_entry_point('pip==8.1.2', 'console_scripts', 'pip2')() File "/usr/local/lib/python2.7/site-packages/pkg_resources/init.py", line 565, in load_entry_point return get_distribution(dist).load_entry_point(group, name) File "/usr/local/lib/python2.7/site-packages/pkg_resources/init.py", line 2597, in load_entry_point raise ImportError("Entry point %r not found" % ((group, name),)) ImportError: Entry point ('console_scripts', 'pip2') not found You can now run Faraday, enjoy!

hktalent commented 8 years ago

brew install CouchDB cd /usr/local/etc/couchdb vi default.ini port to 5985

sudo pip install --ignore-installed --trusted-host pypi.douban.com -i http://pypi.douban.com/simple -r requirements.txt sudo pip install --ignore-installed --trusted-host pypi.douban.com -i http://pypi.douban.com/simple sqlalchemy pyopenssl sudo pip install --ignore-installed --trusted-host pypi.douban.com -i http://pypi.douban.com/simple pyopenssl

$ ./faraday-server.py Checking dependencies 2016-09-15 17:07:39,474 - faraday-server.server.database - ERROR - Unauthorized access to CouchDB. Make sure faraday-server's configuration file has CouchDB admin's credentials set

Ezequieltbh commented 8 years ago

Hi! install.sh is only for debian based distributions, for OS X you need install all manually. More information here: Installation OS X

Also, you need set the Couchdb user and password (Empty if you not configure none user and password in Couchdb) in ~/.faraday/config/server.ini

[couchdb] user= password=

Thats is all! Cheers!

f-amato commented 8 years ago

Any feedback regarding this issue?

Thanks

hktalent commented 8 years ago

@Ezequieltbh so ~~ good!thank you

2016-09-19 11:43:55,803 - faraday.GuiApp - ERROR - Your last workspace untitled is not accessible, check configuration. 2016-09-19 11:43:55,803 - faraday.GuiApp - ERROR - You may try and go to ~/.faraday/config/user.xml to set a valid couch_uri and last_workspace 2016-09-19 11:43:55,803 - faraday.GuiApp - ERROR - Workspace untitled wasn't found

vi ~/.faraday/config/user.xml how to set couch_uri

raise WorkspaceException( ("You're not authorized to access this workspace\n" "Add your credentials to your user configuration " "file in $HOME/.faraday/config/user.xml\n" "For example: " "couch_uri>http://john:password@127.0.0.1:5984</couch_uri"))

brew install john-jumbo ==> Downloading https://homebrew.bintray.com/bottles/john-jumbo-1.8.0.el_capitan.bottle.6.tar.gz

$ john John the Ripper password cracker, version 1.8.0-jumbo-1 [darwin15.2.0 64-bit SSSE3-autoconf] Copyright (c) 1996-2014 by Solar Designer and others Homepage: http://www.openwall.com/john/

Usage: john [OPTIONS] [PASSWORD-FILES] --single[=SECTION] "single crack" mode --wordlist[=FILE] --stdin wordlist mode, read words from FILE or stdin --pipe like --stdin, but bulk reads, and allows rules --loopback[=FILE] like --wordlist, but fetch words from a .pot file --dupe-suppression suppress all dupes in wordlist (and force preload) --encoding=NAME input encoding (eg. UTF-8, ISO-8859-1). See also doc/ENCODING and --list=hidden-options. --rules[=SECTION] enable word mangling rules for wordlist modes --incremental[=MODE] "incremental" mode [using section MODE] --mask=MASK mask mode using MASK --markov[=OPTIONS] "Markov" mode (see doc/MARKOV) --external=MODE external mode or word filter --stdout[=LENGTH] just output candidate passwords [cut at LENGTH] --restore[=NAME] restore an interrupted session [called NAME] --session=NAME give a new session the NAME --status[=NAME] print status of a session [called NAME] --make-charset=FILE make a charset file. It will be overwritten --show[=LEFT] show cracked passwords [if =LEFT, then uncracked] --test[=TIME] run tests and benchmarks for TIME seconds each --users=[-]LOGIN|UID[,..] [do not] load this (these) user(s) only --groups=[-]GID[,..] load users [not] of this (these) group(s) only --shells=[-]SHELL[,..] load users with[out] this (these) shell(s) only --salts=[-]COUNT[:MAX] load salts with[out] COUNT [to MAX] hashes --save-memory=LEVEL enable memory saving, at LEVEL 1..3 --node=MIN[-MAX]/TOTAL this node's number range out of TOTAL count --fork=N fork N processes --pot=NAME pot file to use --list=WHAT list capabilities, see --list=help or doc/OPTIONS --devices=N[,..] set OpenCL device(s) (list using --list=opencl-devices) --format=NAME force hash type NAME: 7z 7z-opencl AFS agilekeychain agilekeychain-opencl aix-smd5 aix-ssha1 aix-ssha256 aix-ssha512 asa-md5 bcrypt bcrypt-opencl bfegg Bitcoin blackberry-es10 Blockchain blockchain-opencl bsdicrypt chap Citrix_NS10 Clipperz cloudkeychain cq CRC32 crypt dahua descrypt descrypt-opencl Django django-scrypt dmd5 dmg dmg-opencl dominosec dragonfly3-32 dragonfly3-64 dragonfly4-32 dragonfly4-64 Drupal7 dummy dynamic_n eCryptfs EFS eigrp EncFS encfs-opencl EPI EPiServer fde FormSpring Fortigate gost gpg gpg-opencl HAVAL-128-4 HAVAL-256-3 hdaa HMAC-MD5 HMAC-SHA1 HMAC-SHA224 HMAC-SHA256 HMAC-SHA384 HMAC-SHA512 hMailServer hsrp IKE ipb2 KeePass keychain keychain-opencl keyring keyring-opencl keystore known_hosts krb4 krb5 krb5-18 krb5pa-md5 krb5pa-md5-opencl krb5pa-sha1 krb5pa-sha1-opencl kwallet LastPass LM lotus5 lotus5-opencl lotus85 LUKS MD2 md4-gen md5crypt md5crypt-opencl md5ns mdc2 MediaWiki MongoDB Mozilla mscash mscash2 mscash2-opencl MSCHAPv2 mschapv2-naive mssql mssql05 mssql12 mysql mysql-sha1 mysql-sha1-opencl mysqlna net-md5 net-sha1 nethalflm netlm netlmv2 netntlm netntlm-naive netntlmv2 nk nsldap NT nt-opencl nt2 ntlmv2-opencl o5logon o5logon-opencl ODF ODF-AES-opencl ODF-opencl Office office2007-opencl office2010-opencl office2013-opencl oldoffice oldoffice-opencl OpenBSD-SoftRAID openssl-enc OpenVMS oracle oracle11 osc Panama PBKDF2-HMAC-SHA1 PBKDF2-HMAC-SHA1-opencl PBKDF2-HMAC-SHA256 PBKDF2-HMAC-SHA256-opencl PBKDF2-HMAC-SHA512 pbkdf2-hmac-sha512-opencl PDF PFX phpass phpass-opencl PHPS pix-md5 PKZIP po postgres PST PuTTY pwsafe pwsafe-opencl RACF RAdmin RAKP RAKP-opencl rar rar-opencl RAR5 RAR5-opencl Raw-Blake2 Raw-Keccak Raw-Keccak-256 Raw-MD4 Raw-MD4-opencl Raw-MD5 Raw-MD5-opencl Raw-MD5u Raw-SHA Raw-SHA1 Raw-SHA1-Linkedin Raw-SHA1-ng Raw-SHA1-opencl Raw-SHA224 Raw-SHA256 Raw-SHA256-ng Raw-SHA256-opencl Raw-SHA384 Raw-SHA512 Raw-SHA512-ng Raw-SHA512-opencl ripemd-128 ripemd-160 rsvp Salted-SHA1 sapb sapg scrypt sha1-gen sha1crypt sha1crypt-opencl sha256crypt sha256crypt-opencl sha512crypt sha512crypt-opencl Siemens-S7 SIP skein-256 skein-512 skey Snefru-128 Snefru-256 SSH SSH-ng ssha-opencl SSHA512 STRIP strip-opencl SunMD5 sxc sxc-opencl Sybase-PROP sybasease tc_aes_xts tc_ripemd160 tc_sha512 tc_whirlpool tcp-md5 Tiger tripcode VNC vtp wbb3 whirlpool whirlpool0 whirlpool1 WoWSRP wpapsk wpapsk-opencl xsha xsha512 XSHA512-opencl ZIP zip-opencl

Ezequieltbh commented 8 years ago

Hi! You need set your user and password, if you have one in couchdb. Remember set this, in the faraday server (~/.faraday/config/server.ini Config file) Also, in the client GTK ~/.faraday/config/user.xml

Set couch_uri Field : http://USERNAME:PASSWORD@IP:PORT

Cheers!

Ezequieltbh commented 8 years ago

Any feedback about this?