You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've set my target and run AutoPwn, and I get the following output. Tried multiple times with the exact same result. D-Link Scanner is able to successfully complete a scan.
rsf (AutoPwn) > run
[*] Running module...
[-] exploits/multi/misfortune_cookie is not vulnerable
[-] exploits/linksys/1500_2500_rce is not vulnerable
[-] exploits/linksys/wap54gv3_rce is not vulnerable
[-] exploits/juniper/screenos_backdoor is not vulnerable
[-] exploits/belkin/n150_path_traversal is not vulnerable
[-] exploits/belkin/g_n150_password_disclosure is not vulnerable
[-] Traceback (most recent call last):
File "/home/pi/routersploit/routersploit/interpreter.py", line 292, in command_run
self.current_module.run()
File "/home/pi/routersploit/routersploit/modules/scanners/autopwn.py", line 49, in run
response = exploit.check()
File "/home/pi/routersploit/routersploit/utils.py", line 101, in wrapper
return fn(self, *args, **kwargs)
File "routersploit/modules/exploits/belkin/n750_rce.py", line 71, in check
response = self.execute(cmd)
File "routersploit/modules/exploits/belkin/n750_rce.py", line 60, in execute
response = http_request(method="POST", url=url, headers=headers, data=data)
File "/home/pi/routersploit/routersploit/utils.py", line 331, in http_request
return getattr(requests, method.lower())(url, **kwargs)
File "/usr/lib/python2.7/dist-packages/requests/api.py", line 94, in post
return request('post', url, data=data, json=json, **kwargs)
File "/usr/lib/python2.7/dist-packages/requests/api.py", line 49, in request
return session.request(method=method, url=url, **kwargs)
File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 457, in request
resp = self.send(prep, **send_kwargs)
File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 606, in send
r.content
File "/usr/lib/python2.7/dist-packages/requests/models.py", line 724, in content
self._content = bytes().join(self.iter_content(CONTENT_CHUNK_SIZE)) or bytes()
File "/usr/lib/python2.7/dist-packages/requests/models.py", line 653, in generate
for chunk in self.raw.stream(chunk_size, decode_content=True):
File "/usr/lib/python2.7/dist-packages/urllib3/response.py", line 256, in stream
data = self.read(amt=amt, decode_content=decode_content)
File "/usr/lib/python2.7/dist-packages/urllib3/response.py", line 186, in read
data = self._fp.read(amt)
File "/usr/lib/python2.7/httplib.py", line 573, in read
s = self.fp.read(amt)
File "/usr/lib/python2.7/socket.py", line 380, in read
data = self._sock.recv(left)
error: [Errno 104] Connection reset by peer
The text was updated successfully, but these errors were encountered:
Seems like it could be an issue with the router you're connecting to and it's failing on the http_request. The routersploit/utils.py/http_request() doesn't account for all exceptions and an except all would catch this error (I think at first glance)
@winduptoy I have added suave exception handling for socket errors within http_request() function. Please update the project using git pull command and test both using scanner and manual execution of failing exploit.
I've set my target and run AutoPwn, and I get the following output. Tried multiple times with the exact same result. D-Link Scanner is able to successfully complete a scan.
The text was updated successfully, but these errors were encountered: