-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
always return 0 result #8
Comments
I haven’t seen this issue in my months of using it, nor has anyone reported it.
Can you provide more information on your use and situation? Your machine type, target, VPN, etc, system updates, etc.
Joe Helle
… On Oct 19, 2020, at 2:08 PM, dickieku ***@***.***> wrote:
socket connect always returned me a timeout while nmap returned results. No clue about it.
Did anyone report that issue ?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
Thanks for your prompt reply.
Actually I am working on your box "Internal" in tryhackme.
I downloaded both v1.0.6 from github and installed the v1.0.7 by pip3 on my
kali 2020.3. Both have the same outcome.
I connected to the box via openvpn.
Ping to the box OK.
Then i run "python3 Threader3000.py", type the IP. Here is the output
…------------------------------------------------------------
Threader 3000 - Multi-threaded Port Scanner
Version 1.0.6
A project by The Mayor
------------------------------------------------------------
Enter your target IP address or URL here: 10.10.90.237
------------------------------------------------------------
Scanning target 10.10.90.237
Time started: 2020-10-19 23:54:36.219422
------------------------------------------------------------
Port scan completed in 0:01:38.901832
------------------------------------------------------------
Threader3000 recommends the following Nmap scan:
************************************************************
nmap -p -sV -sC -T4 -Pn -oA 10.10.90.237 10.10.90.237
************************************************************
Would you like to run Nmap or quit to terminal?
------------------------------------------------------------
1 = Run suggested Nmap scan
2 = Run another Threader3000 scan
3 = Exit to terminal
------------------------------------------------------------
Option Selection:
Then i modified the code so that it print out the error that was catched
except (ConnectionRefusedError, AttributeError, OSError) as e:
print(e)
pass
it printed out "timeout" for all ports that scanned.
I tried it out on a few boxes. same results - 0
see any more information you need
Thank you
Dickie Ku
Joe Helle <notifications@github.com> 於 2020年10月20日 週二 上午2:34寫道:
I haven’t seen this issue in my months of using it, nor has anyone
reported it.
Can you provide more information on your use and situation? Your machine
type, target, VPN, etc, system updates, etc.
Joe Helle
> On Oct 19, 2020, at 2:08 PM, dickieku ***@***.***> wrote:
>
>
> socket connect always returned me a timeout while nmap returned results.
No clue about it.
> Did anyone report that issue ?
>
> —
> You are receiving this because you are subscribed to this thread.
> Reply to this email directly, view it on GitHub, or unsubscribe.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#8 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ARLDDMVLYRTAGFDKBHY3OQLSLSBE7ANCNFSM4SWPPPYA>
.
|
Hi @dievus , first a big thanks to you on providing such a great tool. I bumped into this issue faced by @dickieku today while trying https://tryhackme.com/room/relevant written by you. I am using a Parallel Kali machine on my Mac, both can access TryHackMe room. and nmap can give success response if I do a full port range cover by However, when running threader3000, I don't have any result coming back. It could be a limitation from the ISP network service provider in my office today. but not so sure about it. Will test again when I have fibre access home. Will put my update there and see if I can set a breakpoint in home when having time. |
Forget to mention that sometimes the very first port in the full scanning range will be reported open but the rest of them just came back as negative. Could be a network throttle thing on my network. I am still trying to look into this. |
@Unibrighter I'm guessing it is a network issue, either with your adapter or the VPN. It still works fine here for me, and I just tested it in a couple scenarios. |
Hi @dievus , thanks for getting back to me. After some investigation and a read-through of the python script, I did found the cause of the issue. It's a result of both the throttle (probably set by my InternetServiceProvider) of my internet connection, and the time-out setting set by the program itself.
I am currently using TryHackMe service from Australia and using the CDN with the Australian node. However, the connection is still "comparably" laggy even with CDN.
So I am wondering what's the usual ping lag for you when connecting to TryHackMe victim machine via VPN? If I am not mistaken, the max time consumed for a full port range cover is:
So I increased the limit from 0.3 to 0.5 and it starts working for me instead of only returning flaky result / 0 result. Simple but straight forward.If I make this time-out a configuration item for the user but defaults to 0.3 if not set, would it be considered as a pull request that could potentially be accepted? :) Once again, this gives a great concept that multi-thread can accelerate the port scanning that could be time-consuming. And time management could be a real pain in OSCP as you mentioned before!! Anyway, thanks in advance for getting back to me. Looking forward to your reply so that I can check if you are open to such an idea or I should just fork it to keep it on my own. Also hope this could be helpful to anyone who experience similar issue in the future. |
Hi there. I haven't used TryHackMe in some time, so I am unsure what connection quality may be. Generally speaking, all of the tools on my Github are developed and maintained for my use and I simply make them available for others to use. I usually don't accept pull requests or requests for changes unless it fixes an issue I couldn't figure out or adds something great to the QoL of the tool that I would find useful. So, I probably wouldn't accept the pull request, and certainly encourage you to fork it and make it work best for you. If you look hard enough, you'll probably find versions of it called things like Threader6000 and variations that implement multiple hosts in one scan. In the end, T3000 was a project I used to learn some Python, and I still use it all the time for work. That said, I think it's really great that you spent the time to troubleshoot the problem and find a solution. I definitely encourage you to keep up that energy. I appreciate you taking a bit of time to reach out. Thank you. |
Thanks again for your reply and your kind encouragement, it means a lot to me @dievus . |
Of course @Unibrighter. Feel free to reach out anytime. |
socket connect always returned me a timeout while nmap returned results. No clue about it.
Did anyone report that issue ?
The text was updated successfully, but these errors were encountered: