threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.1k stars 2.31k forks source link

Resource / is not protected by Basic/Digest Auth #574

Closed Exosunandnet closed 3 years ago

Exosunandnet commented 5 years ago
asn1crypto==0.24.0
attrs==17.4.0
Automat==0.6.0
bcrypt==3.1.6
blinker==1.4
bluepy==1.3.0
certifi==2018.1.18
cffi==1.12.2
chardet==3.0.4
click==6.7
cloud-init==18.5
colorama==0.3.7
command-not-found==0.3
configobj==5.0.6
constantly==15.1.0
cryptography==2.1.4
distro-info===0.18ubuntu0.18.04.1
future==0.17.1
httplib2==0.9.2
hyperlink==17.3.1
idna==2.6
incremental==16.10.1
Jinja2==2.10
jsonpatch==1.16
jsonpointer==1.10
jsonschema==2.6.0
keyring==10.6.0
keyrings.alt==3.0
language-selector==0.1
MarkupSafe==1.0
netifaces==0.10.4
oauthlib==2.0.6
PAM==0.4.2
paramiko==2.4.2
ply==3.11
pyasn1==0.4.2
pyasn1-modules==0.2.1
pycparser==2.19
pycrypto==2.6.1
pycryptodome==3.7.3
pycryptodomex==3.7.3
pygobject==3.26.1
PyJWT==1.5.3
PyNaCl==1.3.0
pyOpenSSL==17.5.0
pyserial==3.4
pysmi==0.3.3
pysnmp==4.4.6
python-apt==1.6.3+ubuntu1
python-debian==0.1.32
pyxdg==0.25
PyYAML==3.12
requests==2.18.4
requests-unixsocket==0.1.5
SecretStorage==2.3.1
service-identity==16.0.0
six==1.11.0
ssh-import-id==5.7
systemd-python==234
Twisted==17.9.0
ufw==0.35
unattended-upgrades==0.1
urllib3==1.22
zope.interface==4.3.2

cd routersploit

/home/user/routersploit

./rsf.py

 ______            _            _____       _       _ _
 | ___ \          | |          /  ___|     | |     (_) |
 | |_/ /___  _   _| |_ ___ _ __\ `--. _ __ | | ___  _| |_
 |    // _ \| | | | __/ _ \ '__|`--. \ '_ \| |/ _ \| | __|
 | |\ \ (_) | |_| | ||  __/ |  /\__/ / |_) | | (_) | | |_
 \_| \_\___/ \__,_|\__\___|_|  \____/| .__/|_|\___/|_|\__|
                                     | |
       Exploitation Framework for    |_|    by Threat9
            Embedded Devices

 Codename   : I Knew You Were Trouble
 Version    : 3.4.0
 Homepage   : https://www.threat9.com - @threatnine
 Join Slack : https://www.threat9.com/slack

 Join Threat9 Beta Program - https://www.threat9.com

 Exploits: 130 Scanners: 4 Creds: 171 Generic: 4 Payloads: 32 Encoders: 6

rsf > use creds/generic/http_basic_digest_bruteforce
rsf (HTTP Basic/Digest Bruteforce) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (HTTP Basic/Digest Bruteforce) > set port 80
[+] port => 80
rsf (HTTP Basic/Digest Bruteforce) > set ssl false
[+] ssl => false
rsf (HTTP Basic/Digest Bruteforce) >  set verbosity true
[+] verbosity => true
rsf (HTTP Basic/Digest Bruteforce) > set usernames admin
[+] usernames => admin
rsf (HTTP Basic/Digest Bruteforce) > set passwords file:///home/bot/routersploit/routersploit/resources/wordlists/passwords.txt
[+] passwords => file:///home/bot/routersploit/routersploit/resources/wordlists/passwords.txt
rsf (HTTP Basic/Digest Bruteforce) > run
[*] Running module...
[-] Resource / is not protected by Basic/Digest Auth
rsf (HTTP Basic/Digest Bruteforce) >

Why is this happening?? and the same with the other.

lucyoa commented 5 years ago

Module does not detect that "/" resource is protected by Basic/Digest Auth. Are you sure this is the right path?

Exosunandnet commented 5 years ago

Module does not detect that "/" resource is protected by Basic/Digest Auth. Are you sure this is the right path?

If I am sure