Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not working....invalid syntax #572

Closed
pradeeshkurianfrancis opened this issue Mar 11, 2019 · 4 comments
Closed

Not working....invalid syntax #572

pradeeshkurianfrancis opened this issue Mar 11, 2019 · 4 comments

Comments

@pradeeshkurianfrancis
Copy link

! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !

Steps to Reproduce (for bugs)

  1. rsf > use scanners/autopwn
  2. rsf (AutoPwn) > set target 192.168.1.1
    [+] target => 192.168.1.1
  3. rsf (AutoPwn) > run
    [*] Running module...

Your Environment

  • RouterSploit Version used:
  • Operating System and version: Linux kali 4.14.0-kali3-amd64
  • Python Version: ( python3 --version )
  • Python Environment: ( python3 -m pip freeze )

Current Behavior

[+] target => 192.168.1.1
rsf (AutoPwn) > run
[*] Running module...

[*] Starting vulnerablity check...
Traceback (most recent call last):
File "/root/routersploit/routersploit/interpreter.py", line 369, in command_run
self.current_module.run()
File "/root/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run
for module in utils.iter_modules(directory):
File "/root/routersploit/routersploit/core/exploit/utils.py", line 136, in iter_modules
yield import_exploit(path)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit
module = importlib.import_module(path)
File "/usr/lib/python3.7/importlib/init.py", line 127, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
File "", line 1006, in _gcd_import
File "", line 983, in _find_and_load
File "", line 967, in _find_and_load_unlocked
File "", line 677, in _load_unlocked
File "", line 728, in exec_module
File "", line 219, in _call_with_frames_removed
File "/root/routersploit/routersploit/modules/exploits/generic/ssh_auth_keys.py", line 4, in
from routersploit.core.ssh.ssh_client import SSHClient
File "/root/routersploit/routersploit/core/ssh/ssh_client.py", line 2, in
import paramiko
File "/usr/lib/python3/dist-packages/paramiko/init.py", line 30, in
from paramiko.transport import SecurityOptions, Transport
File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 65, in
from paramiko.sftp_client import SFTPClient
File "/usr/lib/python3/dist-packages/paramiko/sftp_client.py", line 41, in
from paramiko.sftp_file import SFTPFile
File "/usr/lib/python3/dist-packages/paramiko/sftp_file.py", line 66
self._close(async=True)
^
SyntaxError: invalid syntax

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "./rsf.py", line 26, in
routersploit()
File "./rsf.py", line 22, in routersploit
rsf.start()
File "/root/routersploit/routersploit/interpreter.py", line 117, in start
command_handler(args)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 175, in wrapper
return fn(self, *args, **kwargs)
File "/root/routersploit/routersploit/interpreter.py", line 374, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.7/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.7/traceback.py", line 121, in format_exception
type(value), value, tb, limit=limit).format(chain=chain))
File "/usr/lib/python3.7/traceback.py", line 508, in init
capture_locals=capture_locals)
File "/usr/lib/python3.7/traceback.py", line 337, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'

Expected Behavior

It isnt working. Please suggest me the ways to make it work.

@pradeeshkurianfrancis
Copy link
Author

pradeeshkurianfrancis commented Mar 25, 2019 via email

@emadammar
Copy link

', 'ftp_port', 'ftp_ssl', 'ssh_port', 'telnet_port', 'threads'] rsf (AutoPwn) > set target 192.168.1.1 [+] target => 192.168.1.1 rsf (AutoPwn) > run [] Running module... [] Starting vulnerablity check... Traceback (most recent call last): File "/root/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.6/importlib/init.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 994, in _gcd_import File "", line 971, in _find_and_load File "", line 955, in _find_and_load_unlocked File "", line 665, in _load_unlocked File "", line 678, in exec_module File "", line 219, in _call_with_frames_removed File "/root/routersploit/routersploit/modules/exploits/generic/shellshock.py", line 4, in <mod

@iamleot
Copy link
Contributor

iamleot commented Apr 6, 2019

The problem seems in paramiko. Which paramiko version is it used?

@lucyoa
Copy link
Contributor

lucyoa commented Apr 11, 2019

@pradeeshkurianfrancis This part of the issue template:

Python Version: ( python3 --version )
Python Environment: ( python3 -m pip freeze )

means that you are supposed to provide us with python3 --version output and python3 -m pip freeze output. Otherwise we are not able to help you.

@lucyoa lucyoa closed this as completed Oct 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants