Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue when running AutoPwn #48

Closed
ghost opened this issue Apr 26, 2016 · 4 comments
Closed

Issue when running AutoPwn #48

ghost opened this issue Apr 26, 2016 · 4 comments
Assignees
Labels

Comments

@ghost
Copy link

ghost commented Apr 26, 2016

I've set my target and run AutoPwn, and I get the following output. Tried multiple times with the exact same result. D-Link Scanner is able to successfully complete a scan.

rsf (AutoPwn) > run
[*] Running module...
[-] exploits/multi/misfortune_cookie is not vulnerable
[-] exploits/linksys/1500_2500_rce is not vulnerable
[-] exploits/linksys/wap54gv3_rce is not vulnerable
[-] exploits/juniper/screenos_backdoor is not vulnerable
[-] exploits/belkin/n150_path_traversal is not vulnerable
[-] exploits/belkin/g_n150_password_disclosure is not vulnerable
[-] Traceback (most recent call last):
  File "/home/pi/routersploit/routersploit/interpreter.py", line 292, in command_run
    self.current_module.run()
  File "/home/pi/routersploit/routersploit/modules/scanners/autopwn.py", line 49, in run
    response = exploit.check()
  File "/home/pi/routersploit/routersploit/utils.py", line 101, in wrapper
    return fn(self, *args, **kwargs)
  File "routersploit/modules/exploits/belkin/n750_rce.py", line 71, in check
    response = self.execute(cmd)
  File "routersploit/modules/exploits/belkin/n750_rce.py", line 60, in execute
    response = http_request(method="POST", url=url, headers=headers, data=data)
  File "/home/pi/routersploit/routersploit/utils.py", line 331, in http_request
    return getattr(requests, method.lower())(url, **kwargs)
  File "/usr/lib/python2.7/dist-packages/requests/api.py", line 94, in post
    return request('post', url, data=data, json=json, **kwargs)
  File "/usr/lib/python2.7/dist-packages/requests/api.py", line 49, in request
    return session.request(method=method, url=url, **kwargs)
  File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 457, in request
    resp = self.send(prep, **send_kwargs)
  File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 606, in send
    r.content
  File "/usr/lib/python2.7/dist-packages/requests/models.py", line 724, in content
    self._content = bytes().join(self.iter_content(CONTENT_CHUNK_SIZE)) or bytes()
  File "/usr/lib/python2.7/dist-packages/requests/models.py", line 653, in generate
    for chunk in self.raw.stream(chunk_size, decode_content=True):
  File "/usr/lib/python2.7/dist-packages/urllib3/response.py", line 256, in stream
    data = self.read(amt=amt, decode_content=decode_content)
  File "/usr/lib/python2.7/dist-packages/urllib3/response.py", line 186, in read
    data = self._fp.read(amt)
  File "/usr/lib/python2.7/httplib.py", line 573, in read
    s = self.fp.read(amt)
  File "/usr/lib/python2.7/socket.py", line 380, in read
    data = self._sock.recv(left)
error: [Errno 104] Connection reset by peer
@ArtificialImmunity
Copy link
Contributor

Seems like it could be an issue with the router you're connecting to and it's failing on the http_request. The routersploit/utils.py/http_request() doesn't account for all exceptions and an except all would catch this error (I think at first glance)

@fwkz
Copy link
Collaborator

fwkz commented Apr 27, 2016

@winduptoy I have added suave exception handling for socket errors within http_request() function. Please update the project using git pull command and test both using scanner and manual execution of failing exploit.

@fwkz fwkz added the bug label Apr 28, 2016
@fwkz fwkz self-assigned this Apr 28, 2016
@ghost
Copy link
Author

ghost commented Apr 28, 2016

Fixed!

@ghost ghost closed this as completed Apr 28, 2016
@DarkLord610
Copy link

I have the same problem

This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants