peterpt / eternal_scanner

An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)
MIT License
318 stars 105 forks source link

What is missing #2

Closed prince911 closed 6 years ago

prince911 commented 6 years ago

root@kali:~/eternal_scanner# ./escan -ck /root/Desktop/Vulnerable\ Ip/1.txt


Please Wait , checking 500 ips may take a while +---------------------------------------------------+ | Realtime Eternal Scan Metasploit results Checkout | +---------------------------------------------------+ | Please wait for percentage output | +---------------------------------------------------+ [] Scanned 50 of 500 hosts (10% complete) [] Scanned 100 of 500 hosts (20% complete) [] Scanned 151 of 500 hosts (30% complete) [] Scanned 201 of 500 hosts (40% complete) [] Scanned 250 of 500 hosts (50% complete) [] Scanned 300 of 500 hosts (60% complete) [] Scanned 350 of 500 hosts (70% complete) [] Scanned 400 of 500 hosts (80% complete) [] Scanned 450 of 500 hosts (90% complete) [] Scanned 500 of 500 hosts (100% complete)

No vulnerable targets were detected from the list root@kali:~/eternal_scanner# ./escan -c /root/Desktop/Vulnerable\ Ip/1.txt Vulnerable Ip file was not yet created

plz help

peterpt commented 6 years ago

From the list of ips you provided (1.txt) to escan to scan , there was not detected any ip vulnerable . Since not 1 vulnerable ip was detected from file (1.txt) then escan did not create its database yet .

Escan -c does not check your personal ip list file , escan -c only checks the vuln.txt database file in case it exists .

Eternal Scanner is working as it should be .

If you want to find vulnerable ips then execute escan like this : "escan -i 0.0.0.0/0 -s 3000" and let it run for 10 minutes .

prince911 commented 6 years ago

so how i check personal ip

What is the command And what it needs to Continue my target

peterpt commented 6 years ago

read use.md

https://github.com/peterpt/eternal_scanner/blob/master/use.md

prince911 commented 6 years ago

i use escan -ck

but no vulnerable ip list to vuln.txt

peterpt commented 6 years ago

Understand 1 thing . From your 500 ips that you provided to Escan to check , none of them were vulnerable , so , no vuln.txt was created . Escan only creates the database when it finds an ip vulnerable .

Dont you realize that it makes no sense having a database with ips were none of them are vulnerable to the exploit that escan is checking ?

Let me make more simple to you understand :

You put on your refrigerator a bottle with water or any liquid right , it make no sense to put an empty bottle inside the refrigerator .

From the 500 bottles you send to escan to check , none of them had any liquid inside , so escan did not put any bottle inside the refrigerator , this means that right now your refrigerator is empty .

Legend : 500 bottles = 500 ips from your list . refrigerator = escan database .