threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.1k stars 2.31k forks source link

Problem when execut "run" #487

Closed mengo45 closed 6 years ago

mengo45 commented 6 years ago

Your Environment

Hi!! I Have this problem

Codename : I Knew You Were Trouble Version : 3.2.0 Homepage : https://www.threat9.com - @threatnine Join Slack : https://www.threat9.com/slack

Join Threat9 Beta Program - https://www.threat9.com

Exploits: 127 Scanners: 4 Creds: 165 Generic: 4 Payloads: 32 Encoders: 6

rsf > use scanners/autopwn rsf (AutoPwn) > set target 192.168.3.251 [+] target => 192.168.3.251 rsf (AutoPwn) > run [*] Running module...

[] Starting vulnerablity check... Traceback (most recent call last): File "/root/routersploit/routersploit/core/exploit/utils.py", line 80, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.6/importlib/init.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 994, in _gcd_import File "", line 971, in _find_and_load File "", line 955, in _find_and_load_unlocked File "", line 665, in _load_unlocked File "", line 678, in exec_module File "", line 219, in _call_with_frames_removed File "/root/routersploit/routersploit/modules/exploits/routers/thomson/twg849_info_disclosure.py", line 2, in from routersploit.core.snmp.snmp_client import SNMPClient File "/root/routersploit/routersploit/core/snmp/snmp_client.py", line 1, in from pysnmp.entity.rfc3413.oneliner import cmdgen File "/usr/local/lib/python3.6/dist-packages/pysnmp/entity/rfc3413/oneliner/cmdgen.py", line 10, in from pysnmp.hlapi.asyncore import File "/usr/local/lib/python3.6/dist-packages/pysnmp/hlapi/init.py", line 7, in from pysnmp.proto.rfc1902 import * File "/usr/local/lib/python3.6/dist-packages/pysnmp/proto/rfc1902.py", line 9, in from pysnmp.proto import rfc1155, error File "/usr/local/lib/python3.6/dist-packages/pysnmp/proto/rfc1155.py", line 50, in class NetworkAddress(univ.Choice): File "/usr/local/lib/python3.6/dist-packages/pysnmp/proto/rfc1155.py", line 55, in NetworkAddress def clone(self, value=univ.noValue, **kwargs): AttributeError: module 'pyasn1.type.univ' has no attribute 'noValue'

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/root/routersploit/routersploit/interpreter.py", line 334, in command_run self.current_module.run() File "/root/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run for module in utils.iter_modules(directory): File "/root/routersploit/routersploit/core/exploit/utils.py", line 103, in iter_modules yield import_exploit(path) File "/root/routersploit/routersploit/core/exploit/utils.py", line 93, in import_exploit "Use key multiple times for completion.".format(humanize_path(path), err) routersploit.core.exploit.exceptions.RoutersploitException: Error during loading 'routersploit/modules/exploits/routers/thomson/twg849_info_disclosure'

Error: module 'pyasn1.type.univ' has no attribute 'noValue'

It should be valid path to the module. Use key multiple times for completion.

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "rsf.py", line 26, in routersploit() File "rsf.py", line 22, in routersploit rsf.start() File "/root/routersploit/routersploit/interpreter.py", line 116, in start command_handler(args) File "/root/routersploit/routersploit/core/exploit/utils.py", line 138, in wrapper return fn(self, *args, *kwargs) File "/root/routersploit/routersploit/interpreter.py", line 339, in command_run print_error(traceback.format_exc(sys.exc_info())) File "/usr/lib/python3.6/traceback.py", line 163, in format_exc return "".join(format_exception(sys.exc_info(), limit=limit, chain=chain)) File "/usr/lib/python3.6/traceback.py", line 117, in format_exception type(value), value, tb, limit=limit).format(chain=chain)) File "/usr/lib/python3.6/traceback.py", line 486, in init _seen=_seen) File "/usr/lib/python3.6/traceback.py", line 497, in init capture_locals=capture_locals) File "/usr/lib/python3.6/traceback.py", line 332, in extract if limit >= 0: TypeError: '>=' not supported between instances of 'tuple' and 'int'

lucyoa commented 6 years ago

Upgrade your kali to newest version. With kali rolling routersploit is already in repos. Just issue apt-get install routersploit

lillois59 commented 5 years ago

Hey guys ! (osx:10.11.6)

Since now one month I get some problem when I run Routersploit, I mean The first time i've git-cloned was perfectly working ...But now after to setting-up my target and "Run" I get the same error : rsf (Router Scanner) > set target XX.XX.XX.XX run [*] Running module...

[*] Starting vulnerablity check... Traceback (most recent call last): File "/Users/ME/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit module = importlib.import_module(path) File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/importlib/init.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 1006, in _gcd_import File "", line 983, in _find_and_load File "", line 967, in _find_and_load_unlocked File "", line 677, in _load_unlocked File "", line 728, in exec_module File "", line 219, in _call_with_frames_removed File "/Users/ME/routersploit/routersploit/modules/exploits/routers/technicolor/tc7200_password_disclosure_v2.py", line 3, in from Crypto.Cipher import AES File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/site-packages/Crypto/Cipher/init.py", line 27, in from Crypto.Cipher._mode_ecb import _create_ecb_cipher File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/site-packages/Crypto/Cipher/_mode_ecb.py", line 29, in from Crypto.Util._raw_api import (load_pycryptodome_raw_lib, File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/site-packages/Crypto/Util/_raw_api.py", line 32, in from Crypto.Util.py3compat import byte_string ImportError: cannot import name 'byte_string' from 'Crypto.Util.py3compat' (/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/site-packages/Crypto/Util/py3compat.py)

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/Users/ME/routersploit/routersploit/interpreter.py", line 334, in command_run self.current_module.run() File "/Users/ME/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run for module in utils.iter_modules(directory): File "/Users/ME/routersploit/routersploit/core/exploit/utils.py", line 136, in iter_modules yield import_exploit(path) File "/Users/ME/routersploit/routersploit/core/exploit/utils.py", line 122, in import_exploit "Use key multiple times for completion.".format(humanize_path(path), err) routersploit.core.exploit.exceptions.RoutersploitException: Error during loading 'routersploit/modules/exploits/routers/technicolor/tc7200_password_disclosure_v2'

Error: cannot import name 'byte_string' from 'Crypto.Util.py3compat' (/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/site-packages/Crypto/Util/py3compat.py)

It should be valid path to the module. Use key multiple times for completion.

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "rsf.py", line 26, in routersploit() File "rsf.py", line 22, in routersploit rsf.start() File "/Users/ME/routersploit/routersploit/interpreter.py", line 116, in start command_handler(args) File "/Users/ME/routersploit/routersploit/core/exploit/utils.py", line 175, in wrapper return fn(self, *args, *kwargs) File "/Users/ME/routersploit/routersploit/interpreter.py", line 339, in command_run print_error(traceback.format_exc(sys.exc_info())) File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/traceback.py", line 163, in format_exc return "".join(format_exception(sys.exc_info(), limit=limit, chain=chain)) File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/traceback.py", line 117, in format_exception type(value), value, tb, limit=limit).format(chain=chain)) File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/traceback.py", line 485, in init _seen=_seen) File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/traceback.py", line 496, in init capture_locals=capture_locals) File "/Library/Frameworks/Python.framework/Versions/3.7/lib/python3.7/traceback.py", line 331, in extract if limit >= 0: TypeError: '>=' not supported between instances of 'tuple' and 'int'

lillois59 commented 5 years ago

my process to install git-clone cd routersploit sudo python3 -m pip install -r requirements.txt python setup.py install python3 rsf.py ... How I can fit it!

Lucho342 commented 3 years ago

Traceback (most recent call last): File "/data/data/com.termux/files/home/routersploit/routersploit/core/exploit/utils.py", line 109, in import_exploit module = importlib.import_module(path) File "/data/data/com.termux/files/usr/lib/python3.9/importlib/init.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 1030, in _gcd_import File "", line 1007, in _find_and_load File "", line 986, in _find_and_load_unlocked File "", line 680, in _load_unlocked File "", line 850, in exec_module File "", line 228, in _call_with_frames_removed File "/data/data/com.termux/files/home/routersploit/routersploit/modules/exploits/generic/heartbleed.py", line 5, in from cryptography import x509 ModuleNotFoundError: No module named 'cryptography'

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/data/data/com.termux/files/home/routersploit/routersploit/interpreter.py", line 389, in command_run self.current_module.run() File "/data/data/com.termux/files/home/routersploit/routersploit/modules/scanners/autopwn.py", line 77, in run for module in utils.iter_modules(directory): File "/data/data/com.termux/files/home/routersploit/routersploit/core/exploit/utils.py", line 138, in iter_modules yield import_exploit(path) File "/data/data/com.termux/files/home/routersploit/routersploit/core/exploit/utils.py", line 120, in import_exploit raise RoutersploitException( routersploit.core.exploit.exceptions.RoutersploitException: Error during loading 'routersploit/modules/exploits/generic/heartbleed'

Error: No module named 'cryptography'

It should be valid path to the module. Use key multiple times for completion.

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/data/data/com.termux/files/home/routersploit/rsf.py", line 29, in routersploit(sys.argv) File "/data/data/com.termux/files/home/routersploit/rsf.py", line 25, in routersploit rsf.start() File "/data/data/com.termux/files/home/routersploit/routersploit/interpreter.py", line 125, in start command_handler(args, *kwargs) File "/data/data/com.termux/files/home/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper return fn(self, args, *kwargs) File "/data/data/com.termux/files/home/routersploit/routersploit/interpreter.py", line 394, in command_run print_error(traceback.format_exc(sys.exc_info())) File "/data/data/com.termux/files/usr/lib/python3.9/traceback.py", line 167, in format_exc return "".join(format_exception(sys.exc_info(), limit=limit, chain=chain)) File "/data/data/com.termux/files/usr/lib/python3.9/traceback.py", line 120, in format_exception return list(TracebackException( File "/data/data/com.termux/files/usr/lib/python3.9/traceback.py", line 493, in init context = TracebackException( File "/data/data/com.termux/files/usr/lib/python3.9/traceback.py", line 508, in init self.stack = StackSummary.extract( File "/data/data/com.termux/files/usr/lib/python3.9/traceback.py", line 340, in extract if limit >= 0: TypeError: '>=' not supported between instances of 'tuple' and 'int'