jok3r icon indicating copy to clipboard operation
jok3r copied to clipboard

AttributeError: 'str' object has no attribute 'is_service_supported'

Open dabula-s opened this issue 4 years ago • 3 comments

...
[*] Check if service is reachable...
[*] A matching service has been found in the database
[+] Updated: host ***.***.***.*** | port 21/tcp | service ftp
[+] Target reachable: host ***.***.***.*** | port 21/tcp | service ftp
[*] Products detected for this target:
+------------+--------+---------+
| Type       | Name   | Version |
+------------+--------+---------+
| ftp-server | Vsftpd | 2.3.4   |
+------------+--------+---------+
[*] [SMART] SmartStart processing to initialize context...
[*] [SMART] Product detected from banner: ftp-server = Vsftpd 2.3.4
[*] [SMART] Product detected: ftp-server=Vsftpd 2.3.4. Not updated because already in db
[!] Unexpected error occured: 'str' object has no attribute 'is_service_supported'
Traceback (most recent call last):
  File "jok3r.py", line 44, in __init__
    controller.run()
  File "/root/jok3r/lib/controller/MainController.py", line 23, in run
    }.get(self.arguments.mode)(self.arguments, self.settings, self.sqlsess).run()
  File "/root/jok3r/lib/controller/AttackController.py", line 88, in run
    self.__run_for_multi_targets(args)
  File "/root/jok3r/lib/controller/AttackController.py", line 224, in __run_for_multi_targets
    self.attack_scope.attack()
  File "/root/jok3r/lib/core/AttackScope.py", line 163, in attack
    self.__attack_target(target, attack_progress)
  File "/root/jok3r/lib/core/AttackScope.py", line 199, in __attack_target
    attack_progress=attack_progress)
  File "/root/jok3r/lib/core/ServiceChecks.py", line 150, in run
    attack_progress)
  File "/root/jok3r/lib/core/ServiceChecks.py", line 325, in __run_special_mode
    if not attack_profile.is_service_supported(target.get_service_name()):
AttributeError: 'str' object has no attribute 'is_service_supported'

Your docker image is used. So my steps to reproduce the issue:

  1. Run the command from your simple examples: python3 jok3r.py attack -m <mission_name> --profile <some_profile_name> --fast
  2. Profit.

dabula-s avatar Sep 05 '19 10:09 dabula-s

I tried from my side, and I can't reproduce the problem for the moment with red-team and fast-scan profile. Maybe tried to backup your current sqlite joker database and retry while there is no database upgrade management (will come).

cyrinux avatar Sep 06 '19 09:09 cyrinux

Keep bumping up against this issue in the docker image. Happens regardless of the profile selected.

TheTechromancer avatar Sep 01 '20 16:09 TheTechromancer

I had this issue as well. Running specifically the red-team profile against a mission I imported hosts via nmap XML. I just removed the --profile red-team and the attack ran.

zwatkins15 avatar Dec 08 '21 16:12 zwatkins15