Closed McDonaldsTriad closed 4 years ago
The problem has been solved. Several days ago I ran the usual apt-update command, followed by apt-upgrade, and that sorted everything out. Since the update & upgrade routersploit functions like normal again, no more segmentation faults!
Steps to Reproduce (for bugs)
python3 rsf.py
rsf > use scanners/autopwn
rsf (AutoPwn) > set target 192.168.178.1 [+] target => 192.168.178.1
rsf (AutoPwn) > run [] Running module scanners/autopwn... [] 192.168.178.1 Starting vulnerablity check... Segmentatiefout (=Segmentation error translated to English)
python3 rsf.py
rsf > use scanners/routers/router_scan
rsf (Router Scanner) > set target 192.168.178.1 [+] target => 192.168.178.1
rsf (Router Scanner) > run [] Running module scanners/routers/router_scan... [] 192.168.178.1 Starting vulnerablity check... Segmentatiefout
python3 rsf.py
rsf > use scanners/routers/router_scan
rsf (Misc Scanner) > set target 192.168.178.1 [+] target => 192.168.178.1
rsf (Misc Scanner) > run [] Running module scanners/misc/misc_scan... [] 192.168.178.1 Starting vulnerablity check... [-] 192.168.178.1:80 http exploits/generic/heartbleed is not vulnerable [-] 192.168.178.1:80 http exploits/misc/miele/pg8528_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/misc/wepresent/wipg1000_rce is not vulnerable [-] 192.168.178.1:80 http exploits/misc/asus/b1m_projector_rce is not vulnerable [-] 192.168.178.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable [-] 192.168.178.1:80 http exploits/generic/shellshock is not vulnerable [*] Elapsed time: 60.0700 seconds
[*] 192.168.178.1 Starting default credentials check... Segmentatiefout
rsf > use scanners/cameras/camera_scan
rsf (Camera Scanner) > show options
rsf (Camera Scanner) > set target 192.168.178.1 [+] target => 192.168.178.1
rsf (Camera Scanner) > run [*] Running module scanners/cameras/camera_scan...
[] 192.168.178.1 Starting vulnerablity check... [-] 192.168.178.1:80 http exploits/generic/heartbleed is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/mvpower/dvr_jaws_rce is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/honeywell/hicc_1100pt_password_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/avigilon/videoiq_camera_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/xiongmai/uc_httpd_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/jovision/jovision_credentials_disclosure is not vulnerable [-] 192.168.178.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/siemens/cvms2025_credentials_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/brickcom/corp_network_cameras_conf_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/generic/shellshock is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/cisco/video_surv_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/dlink/dcs_930l_932l_auth_bypass is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/brickcom/users_cgi_creds_disclosure is not vulnerable [-] 192.168.178.1:23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_sqli is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/dvr_creds_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/jvc_vanderbilt_honeywell_path_traversal is not vulnerable [-] 192.168.178.1:23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_backdoor is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/P2P_wificam_rce is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/P2P_wificam_credential_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/netwave_ip_camera_information_disclosure is not vulnerable [] Elapsed time: 120.1400 seconds
[*] 192.168.178.1 Starting default credentials check... Segmentatiefout
Current Behavior
Starting up RouterSploit also goes without any issues, and so does choosing a module and setting it up. But when I try to run the module, and that module happens to be one of the scanner modules, almost inmediately RouterSploit gives me an error and quits on me. I've tested several different modules to see what happens, but only while using 1 of the 4 scanner modules I encounter the problem mentioned. When I run any of the exploit modules I don't seem to get any errors, although I've only tested a couple exploit modules.
Expected Behavior