Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DeepExploit issue #50

Open
skyghost66 opened this issue Oct 31, 2019 · 0 comments
Open

DeepExploit issue #50

skyghost66 opened this issue Oct 31, 2019 · 0 comments

Comments

@skyghost66
Copy link

hello im coming across DeepExploit and i need some help if its still here the admin, after ruining the Exploit i have issue like
[] Start time: 2019/10/31 16:52:58
[
] Port scanning: 192.168.1.247 [Elapsed time: 0 s]
[] Executing keep_alive..
[
] End time : 2019/10/31 16:53:03
[+] Get port list from /root/nmap_result_192.168.1.247.xml.
[!] No open port.
[!] Shutdown Deep Exploit..

AFTER changing some files

nmap_result += ret.get(b'data').decode('utf-8')

        #        status = ret.get(b'busy')
        #        if status is False:
        #            break
                with open(nmap_result_file) as fi:
                    nmap_result = fi.read()

i WAS able to READ THE NMAP FILES , BUT I HAVE A ISSUE AGAIN LIKE
[] Getting 21/tcp info: unknown
[
] Getting 22/tcp info: unknown
[] Getting 23/tcp info: unknown
[
] Getting 25/tcp info: unknown
[] Getting 53/tcp info: unknown
[
] Getting 80/tcp info: unknown
[] Getting 111/tcp info: unknown
[
] Getting 139/tcp info: unknown
[] Getting 445/tcp info: unknown
[
] Getting 512/tcp info: unknown
[] Getting 513/tcp info: unknown
[
] Getting 514/tcp info: unknown
[] Getting 1099/tcp info: unknown
[
] Getting 1524/tcp info: unknown
[] Getting 2049/tcp info: unknown
[
] Getting 2121/tcp info: unknown
[] Getting 3306/tcp info: unknown
[
] Getting 5432/tcp info: unknown
[] Getting 5900/tcp info: unknown
[
] Getting 6000/tcp info: unknown
[] Getting 6667/tcp info: unknown
[
] Getting 8180/tcp info: unknown
[+] Get exploit list.
[*] Loading exploit list from Metasploit.
[-] MsfRPC: Not Authenticated.

HOW CAN I DO THIS TO WORKS , IM CONNECTED TO THE MSF CONSOLE AND IM RUINING THE RPC SERVER!!! SOME HELP SHALL BE GREAT , THANK YOU~!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant