routersploit
routersploit copied to clipboard
Not working....invalid syntax
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
- rsf > use scanners/autopwn
- rsf (AutoPwn) > set target 192.168.1.1 [+] target => 192.168.1.1
- rsf (AutoPwn) > run [*] Running module...
Your Environment
- RouterSploit Version used:
- Operating System and version: Linux kali 4.14.0-kali3-amd64
- Python Version: (
python3 --version
) - Python Environment: (
python3 -m pip freeze
)
Current Behavior
[+] target => 192.168.1.1 rsf (AutoPwn) > run [*] Running module...
[*] Starting vulnerablity check...
Traceback (most recent call last):
File "/root/routersploit/routersploit/interpreter.py", line 369, in command_run
self.current_module.run()
File "/root/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run
for module in utils.iter_modules(directory):
File "/root/routersploit/routersploit/core/exploit/utils.py", line 136, in iter_modules
yield import_exploit(path)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit
module = importlib.import_module(path)
File "/usr/lib/python3.7/importlib/init.py", line 127, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
File "
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "./rsf.py", line 26, in
Expected Behavior
It isnt working. Please suggest me the ways to make it work.
I've tried it and its still the same with those exceptions. Can you suggest me something else?
On Mon, Mar 25, 2019 at 1:18 AM OseidAldary(Joker11) < [email protected]> wrote:
I have encountered the same problem and this the fix
the problem is wrong pyasn1 module version in python3 is already installed but the version is differane than the version of this project needed so the version in this project needed is pyasn1 version 0.2.3
so just run this commands pip uninstall pyasn1 pip install pyasn1==0.2.3
and it will work like a charm
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/threat9/routersploit/issues/572#issuecomment-475993170, or mute the thread https://github.com/notifications/unsubscribe-auth/AqX5oGNlZNObMjxXy9IK3Qf-Ey3MiS8iks5vZ9aogaJpZM4boOCE .
-- Disclaimer: "The information contained herein (including any accompanying documents) is confidential and is intended solely for the addressee(s). If you have erroneously received this message, please immediately delete it and notify the sender. Also, if you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution or taking any action in reliance on the contents of this message or any accompanying document is strictly prohibited and is unlawful. The organization is not responsible for any damage caused by a virus or alteration of the e-mail by a third party or otherwise. Email security protocols used DMARC, SPF and DKIM. Amal Jyothi College of Engineering, Kanjirappally, Kottayam, Kerala, India - 686518 https://ajce.in
', 'ftp_port', 'ftp_ssl', 'ssh_port', 'telnet_port', 'threads'] rsf (AutoPwn) > set target 192.168.1.1 [+] target => 192.168.1.1 rsf (AutoPwn) > run [] Running module... [] Starting vulnerablity check... Traceback (most recent call last): File "/root/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.6/importlib/init.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "
The problem seems in paramiko. Which paramiko version is it used?
@pradeeshkurianfrancis This part of the issue template:
Python Version: ( python3 --version )
Python Environment: ( python3 -m pip freeze )
means that you are supposed to provide us with python3 --version
output and python3 -m pip freeze
output. Otherwise we are not able to help you.