Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error 104 : Connection reset by peer #75

Closed
felangga opened this issue May 8, 2016 · 2 comments
Closed

Error 104 : Connection reset by peer #75

felangga opened this issue May 8, 2016 · 2 comments
Labels

Comments

@felangga
Copy link

felangga commented May 8, 2016

I'm about to scan my tplink router with scanner/autopwn, but it give me this error
rsf (AutoPwn) > run
[_] Running module...
[-] exploits/comtrend/ct_5361t_password_disclosure is not vulnerable
[-] exploits/asmax/ar_1004g_password_disclosure is not vulnerable
[-] exploits/asmax/ar_804_gu_rce is not vulnerable
[-] exploits/2wire/gateway_auth_bypass is not vulnerable
[-] exploits/belkin/g_n150_password_disclosure is not vulnerable
[-] exploits/belkin/n150_path_traversal is not vulnerable
[-] exploits/belkin/n750_rce is not vulnerable
[-] exploits/belkin/g_plus_info_disclosure is not vulnerable
[-] exploits/juniper/screenos_backdoor is not vulnerable
[-] exploits/ubiquiti/airos_6_x is not vulnerable
[-] exploits/multi/misfortune_cookie is not vulnerable
[-] exploits/multi/shellshock is not vulnerable
[-] Traceback (most recent call last):
File "/home/netgear/pwn/routersploit/routersploit/interpreter.py", line 261, in command_run
self.current_module.run()
File "/home/netgear/pwn/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run
response = exploit.check()
File "/home/netgear/pwn/routersploit/routersploit/utils.py", line 153, in wrapper
return fn(self, *args, *_kwargs)
File "routersploit/modules/exploits/multi/heartbleed.py", line 164, in check
typ, ver, pay = self.recvmsg(s)
File "routersploit/modules/exploits/multi/heartbleed.py", line 102, in recvmsg
pay = self.recvall(s, ln, 10)
File "routersploit/modules/exploits/multi/heartbleed.py", line 87, in recvall
data = s.recv(remain)
error: [Errno 104] Connection reset by peer

@lucyoa
Copy link
Contributor

lucyoa commented May 8, 2016

@felangga I pushed fix with this commit: b203413
Please check if it works properly.

@felangga
Copy link
Author

felangga commented May 8, 2016

Yeah, that's working perfectly

@felangga felangga closed this as completed May 8, 2016
@fwkz fwkz added the bug label May 9, 2016
@fwkz fwkz added this to the Bad Blood 2.2.0 milestone May 11, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants