You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
exploits/juniper/screenos_backdoor crash after Succesful authentication:
rsf (Juniper ScreenOS Backdoor) > run
[*] Running module...
[+] SSH - Successful authentication
>help
[-] Traceback (most recent call last):
File "/home/gchain/routersploit/routersploit/interpreter.py", line 292, in command_run
self.current_module.run()
File "/home/gchain/routersploit/routersploit/modules/exploits/juniper/screenos_backdoor.py", line 51, in run
stdin, stdout, stderr = ssh.exec_command(cmd.strip())
File "/home/gchain/.venv/py2/lib/python2.7/site-packages/paramiko/client.py", line 418, in exec_command
chan.exec_command(command)
File "/home/gchain/.venv/py2/lib/python2.7/site-packages/paramiko/channel.py", line 60, in _check
return func(self, *args, **kwds)
File "/home/gchain/.venv/py2/lib/python2.7/site-packages/paramiko/channel.py", line 234, in exec_command
self._wait_for_event()
File "/home/gchain/.venv/py2/lib/python2.7/site-packages/paramiko/channel.py", line 1103, in _wait_for_event
raise e
SSHException: Channel closed
The text was updated successfully, but these errors were encountered:
@gchaincl this exploit targets Juniper ScreenOS devices. It seems you have SonicWALL.
Does RouterSploit still show that device is vulnerable? Issue seems to lie in paramiko package that does not throw AuthenticationException for some reasons. Weird SonicWALL ssh implementation?
exploits/juniper/screenos_backdoor
crash after Succesful authentication:The text was updated successfully, but these errors were encountered: