pymetasploit
pymetasploit copied to clipboard
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:661)
from metasploit.msfrpc import MsfRpcClient
client = MsfRpcClient('mypassword')
Traceback (most recent call last):
File "
Hey, what's your setup?
➜ ~ msfrpcd -P mypassword -n -f -a 127.0.0.1 [] MSGRPC starting on 127.0.0.1:55553 (SSL):Msg... [] MSGRPC ready at 2017-02-01 21:06:57 +0800.
from metasploit.msfrpc import MsfRpcClient client = MsfRpcClient('mypassword')
@xl7dev try the following code
import ssl
try:
_create_unverified_https_context = ssl._create_unverified_context
except AttributeError:
pass
else:
ssl._create_default_https_context = _create_unverified_https_context`
from metasploit.msfrpc import MsfRpcClient
client = MsfRpcClient('mypassword')```
@benkhlifafahmi thanks
I tried the above fix and I'm still getting a hang up during the basic enumeration of a exploit module.
@devcoinfet do you get the same error ??? if not please paste the new exception
yes but I have figured it out and am porting my new found working version of msfrpc connection into a tool I'm coding I am no longer using pymetasploit. If you wish to know how to set it up you can respond here with a mail and I'll conact you off pymetasploits page so we don't clutter there issues page with no pymeta support
On Wed, Feb 14, 2018 at 10:18 AM, Ben Khlifa Fahmi <[email protected]
wrote:
@devcoinfet https://github.com/devcoinfet do you get the same error ??? if not please paste the new exception
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/allfro/pymetasploit/issues/10#issuecomment-365697571, or mute the thread https://github.com/notifications/unsubscribe-auth/AhJZgTUoCNnkm2ZVQnEvzQLppRl8_zjdks5tUyOQgaJpZM4Ltn1b .
@devcoinfet yeah i'll be glad if you share your solution via [email protected]
I'm curious too. [email protected]
Can you send you working version to me as well ? [email protected]
There's a working version in my github
https://github.com/devcoinfet/TheSurg30n
I, was 95% done with this so I released it I believe all that is left is to properly add the nixawk cve in for cisco. I think I forgot to add the rest of the code perhaps otherwise she works well.
On Mon, Apr 9, 2018 at 11:54 AM, Hans Daigle [email protected] wrote:
Can you send you working version to me as well ? [email protected]
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/allfro/pymetasploit/issues/10#issuecomment-379856747, or mute the thread https://github.com/notifications/unsubscribe-auth/AhJZgVg6Rmxzyb6q_6aVmVl21NvFLomAks5tm650gaJpZM4Ltn1b .
As well, make sure you load Metasploit up and the MSGRPC password=abc123
https://gist.github.com/carnal0wnage/5f5f64432738fc25c538
On Mon, Apr 9, 2018 at 6:19 PM, Wabefet Hacker [email protected] wrote:
There's a working version in my github
https://github.com/devcoinfet/TheSurg30n
I, was 95% done with this so I released it I believe all that is left is to properly add the nixawk cve in for cisco. I think I forgot to add the rest of the code perhaps otherwise she works well.
On Mon, Apr 9, 2018 at 11:54 AM, Hans Daigle [email protected] wrote:
Can you send you working version to me as well ? [email protected]
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/allfro/pymetasploit/issues/10#issuecomment-379856747, or mute the thread https://github.com/notifications/unsubscribe-auth/AhJZgVg6Rmxzyb6q_6aVmVl21NvFLomAks5tm650gaJpZM4Ltn1b .