-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not working....invalid syntax #572
Comments
I've tried it and its still the same with those exceptions. Can you suggest
me something else?
…On Mon, Mar 25, 2019 at 1:18 AM OseidAldary(Joker11) < ***@***.***> wrote:
I have encountered the same problem and this the fix
the problem is wrong pyasn1 module version in python3 is already installed
but the version is differane than the version of this project needed so the
version in this project needed is pyasn1 version 0.2.3
so just run this commands
pip uninstall pyasn1
pip install pyasn1==0.2.3
and it will work like a charm
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#572 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AqX5oGNlZNObMjxXy9IK3Qf-Ey3MiS8iks5vZ9aogaJpZM4boOCE>
.
--
Disclaimer:
"The information contained herein (including any accompanying
documents) is confidential and is intended solely for the addressee(s). If
you have erroneously received this message, please immediately delete it
and notify the sender. Also, if you are not the intended recipient, you are
hereby notified that any disclosure, copying, distribution or taking any
action in reliance on the contents of this message or any accompanying
document is strictly prohibited and is unlawful. The organization is not
responsible for any damage caused by a virus or alteration of the e-mail by
a third party or otherwise. Email security protocols used DMARC, SPF and
DKIM.
*Amal Jyothi College of Engineering, Kanjirappally, Kottayam, Kerala,
India - 686518* <https://ajce.in>
|
', 'ftp_port', 'ftp_ssl', 'ssh_port', 'telnet_port', 'threads'] rsf (AutoPwn) > set target 192.168.1.1 [+] target => 192.168.1.1 rsf (AutoPwn) > run [] Running module... [] Starting vulnerablity check... Traceback (most recent call last): File "/root/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.6/importlib/init.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 994, in _gcd_import File "", line 971, in _find_and_load File "", line 955, in _find_and_load_unlocked File "", line 665, in _load_unlocked File "", line 678, in exec_module File "", line 219, in _call_with_frames_removed File "/root/routersploit/routersploit/modules/exploits/generic/shellshock.py", line 4, in <mod |
The problem seems in paramiko. Which paramiko version is it used? |
@pradeeshkurianfrancis This part of the issue template:
means that you are supposed to provide us with |
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
[+] target => 192.168.1.1
[*] Running module...
Your Environment
python3 --version
)python3 -m pip freeze
)Current Behavior
[+] target => 192.168.1.1
rsf (AutoPwn) > run
[*] Running module...
[*] Starting vulnerablity check...
Traceback (most recent call last):
File "/root/routersploit/routersploit/interpreter.py", line 369, in command_run
self.current_module.run()
File "/root/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run
for module in utils.iter_modules(directory):
File "/root/routersploit/routersploit/core/exploit/utils.py", line 136, in iter_modules
yield import_exploit(path)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 107, in import_exploit
module = importlib.import_module(path)
File "/usr/lib/python3.7/importlib/init.py", line 127, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
File "", line 1006, in _gcd_import
File "", line 983, in _find_and_load
File "", line 967, in _find_and_load_unlocked
File "", line 677, in _load_unlocked
File "", line 728, in exec_module
File "", line 219, in _call_with_frames_removed
File "/root/routersploit/routersploit/modules/exploits/generic/ssh_auth_keys.py", line 4, in
from routersploit.core.ssh.ssh_client import SSHClient
File "/root/routersploit/routersploit/core/ssh/ssh_client.py", line 2, in
import paramiko
File "/usr/lib/python3/dist-packages/paramiko/init.py", line 30, in
from paramiko.transport import SecurityOptions, Transport
File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 65, in
from paramiko.sftp_client import SFTPClient
File "/usr/lib/python3/dist-packages/paramiko/sftp_client.py", line 41, in
from paramiko.sftp_file import SFTPFile
File "/usr/lib/python3/dist-packages/paramiko/sftp_file.py", line 66
self._close(async=True)
^
SyntaxError: invalid syntax
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "./rsf.py", line 26, in
routersploit()
File "./rsf.py", line 22, in routersploit
rsf.start()
File "/root/routersploit/routersploit/interpreter.py", line 117, in start
command_handler(args)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 175, in wrapper
return fn(self, *args, **kwargs)
File "/root/routersploit/routersploit/interpreter.py", line 374, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.7/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.7/traceback.py", line 121, in format_exception
type(value), value, tb, limit=limit).format(chain=chain))
File "/usr/lib/python3.7/traceback.py", line 508, in init
capture_locals=capture_locals)
File "/usr/lib/python3.7/traceback.py", line 337, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'
Expected Behavior
It isnt working. Please suggest me the ways to make it work.
The text was updated successfully, but these errors were encountered: