-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
I'm having a issue with routersploit in ParrotSec 6.3 #871
Comments
I'm having the exact same issue here with the latest version of ParrotOS as of today. The script will run fine for the first try then when you open new terminal to run the script again you will be able to run routersploit framework interface but not the actual running core for some weird reason (cannot preform any Scans). Tried to change my environment a bit but nothing to work. If you found any solution for it please let me know, i appreciate it. |
Yes i finally found a solution and i would be to happy to share it with you!! :-) Do this steps below.....
And if you want to run other tools don't forget to do this when you switch to another one!! This setup keeps your system Python clean while giving RouterSploit its own isolated environment with all the dependencies it needs. When you're done using RouterSploit, you can deactivate the virtual environment by typing: source rsf_venv/bin/deactivate So every single time you run the tool you need to do the number 3. first to activate venv and run the tool. Now i got into my self another problem which is i changed the directory from home to /opt and the tool is not running and now i have find this problem solution lol...... :-p I did mistake and that is all the tools like metasploits. zap-proxy and burpsuite they actually stay in /opt folder but because did those above stuff on home directory and now i move the directory from home to opt the tool is not running i have hope i wll find solution too for this. And i also found new exploits for the routersploit on the internet. I am going contribute it i hope the author will allow me to add this new exploits to the stock modules/exploits folder. :-D |
Thank you so much sir! You saved me, Keep up the Great work. |
Every time i run routersploit this error shows what should i do please fix it. And don't tell me to over-ride and break the system or package cause i don't wanna do that. If any of you have any safe way to fix this issue please let me know thanks. It would be great if the main developer re-write the program from it's a great tool. Specially for doing Red Teaming stuff if they remove unused or not maintained packages from the tool repo i think that way it might solve the issue.
Traceback (most recent call last):
File "/home/asus/exploitdb/RouterSploit/routersploit/core/exploit/utils.py", line 109, in import_exploit
module = importlib.import_module(path)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/importlib/init.py", line 126, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "", line 1206, in _gcd_import
File "", line 1178, in _find_and_load
File "", line 1149, in _find_and_load_unlocked
File "", line 690, in _load_unlocked
File "", line 940, in exec_module
File "", line 241, in _call_with_frames_removed
File "/home/asus/exploitdb/RouterSploit/routersploit/modules/exploits/routers/technicolor/tc7200_password_disclosure_v2.py", line 3, in
from Crypto.Cipher import AES
ModuleNotFoundError: No module named 'Crypto'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/home/asus/exploitdb/RouterSploit/routersploit/interpreter.py", line 396, in command_run
self.current_module.run()
File "/home/asus/exploitdb/RouterSploit/routersploit/modules/scanners/autopwn.py", line 77, in run
for module in utils.iter_modules(directory):
File "/home/asus/exploitdb/RouterSploit/routersploit/core/exploit/utils.py", line 138, in iter_modules
yield import_exploit(path)
^^^^^^^^^^^^^^^^^^^^
File "/home/asus/exploitdb/RouterSploit/routersploit/core/exploit/utils.py", line 120, in import_exploit
raise RoutersploitException(
routersploit.core.exploit.exceptions.RoutersploitException: Error during loading 'routersploit/modules/exploits/routers/technicolor/tc7200_password_disclosure_v2'
Error: No module named 'Crypto'
It should be valid path to the module. Use key multiple times for completion.
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/home/asus/exploitdb/RouterSploit/rsf.py", line 28, in
routersploit(sys.argv)
File "/home/asus/exploitdb/RouterSploit/rsf.py", line 24, in routersploit
rsf.start()
File "/home/asus/exploitdb/RouterSploit/routersploit/interpreter.py", line 128, in start
command_handler(args, **kwargs)
File "/home/asus/exploitdb/RouterSploit/routersploit/core/exploit/utils.py", line 177, in wrapper
return fn(self, *args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^
File "/home/asus/exploitdb/RouterSploit/routersploit/interpreter.py", line 401, in command_run
print_error(traceback.format_exc(sys.exc_info()))
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/traceback.py", line 187, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/traceback.py", line 139, in format_exception
te = TracebackException(type(value), value, tb, limit=limit, compact=True)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/traceback.py", line 690, in init
self.stack = StackSummary._extract_from_extended_frame_gen(
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/traceback.py", line 409, in _extract_from_extended_frame_gen
if limit >= 0:
^^^^^^^^^^
TypeError: '>=' not supported between instances of 'tuple' and 'int'
The text was updated successfully, but these errors were encountered: