You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
OSes and version: Kali Linux 2023.04 WSL2 & Ubuntu Core 22.04
Python Version: 3.11.8
I Tried with those module names:
all, *_scan : These will just run the port_scan
*_vuln : This even crazier, it just returned:
this scan module [*_vuln] not found!
I tried git clone, get the zip then unzip. reinstall WSL and VM but no work 😭
Here was the verbose logs from python nettacker.py -i 192.168.133.130 --profile vuln --verbose
[2024-03-05 03:52:57][+] Nettacker engine started ...
[2024-03-05 03:52:57][+] 96 modules loaded ...
[2024-03-05 03:52:57][+] regrouping targets based on hardware resources!
[2024-03-05 03:52:57][+] Removing old database record for selected targets and modules.
[2024-03-05 03:52:57][+] imported 1 targets in 1 process(es).
[2024-03-05 03:52:57][+] process-1| process is started!
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130| started module thread number 1 from 1
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 1 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 2 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 3 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 4 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 1/1005| all conditions failed
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 0/1005| all conditions failed
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 2/1005| all conditions failed
[2024-03-05 03:52:57][+] {"timeout": 3.0, "host": "192.168.133.130", "ports": "3", "method": "tcp_connect_send_and_receive", "response": {"condition_type": "or", "ssl_flag": false, "conditions_results": []}}
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 3/1005| all conditions failed
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 5 from 1005
[2024-03-05 03:52:57][+] {"timeout": 3.0, "host": "192.168.133.130", "ports": "4", "method": "tcp_connect_send_and_receive", "response": {"condition_type": "or", "ssl_flag": false, "conditions_results": []}}
[2024-03-05 03:52:57][+] {"timeout": 3.0, "host": "192.168.133.130", "ports": "6", "method": "tcp_connect_send_and_receive", "response": {"condition_type": "or", "ssl_flag": false, "conditions_results": []}}
-----stuffs from port_scan --------
[2024-03-05 03:53:23][+] process-1|port_scan|192.168.133.130| finished module thread number 1 from 1
[2024-03-05 03:53:23][+] Removing old database record for selected targets and modules.
[2024-03-05 03:53:24][+] imported 1 targets in 1 process(es).
[2024-03-05 03:53:24][+] process-1| process is started!
[2024-03-05 03:53:24][+] process-1|accela_cve_2021_34370_vuln|192.168.133.130| started module thread number 1 from 61
[2024-03-05 03:53:24][+] process-1|accela_cve_2021_34370_vuln|192.168.133.130| finished module thread number 1 from 61
[2024-03-05 03:53:24][+] process-1|adobe_coldfusion_cve_2023_26360_vuln|192.168.133.130| started module thread number 2 from 61
[2024-03-05 03:53:24][+] process-1|adobe_coldfusion_cve_2023_26360_vuln|192.168.133.130| finished module thread number 2 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_41773_vuln|192.168.133.130| started module thread number 3 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_41773_vuln|192.168.133.130| finished module thread number 3 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_42013_vuln|192.168.133.130| started module thread number 4 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_42013_vuln|192.168.133.130| finished module thread number 4 from 61
[2024-03-05 03:53:24][+] process-1|apache_struts_vuln|192.168.133.130| started module thread number 5 from 61
[2024-03-05 03:53:24][+] process-1|apache_struts_vuln|192.168.133.130| finished module thread number 5 from 61
------ Stuffs from called out other modules, but it just not run ----------
If it was because of the local ip, wrong way to input ip instead of url, just let me know!
p/s: I also tried with http://[ip]/ but still not help anything
OSes and version:
Kali Linux 2023.04 WSL2
&Ubuntu Core 22.04
Python Version:
3.11.8
I Tried with those module names:
all, *_scan
: These will just run the port_scan*_vuln
: This even crazier, it just returned:I tried git clone, get the zip then unzip. reinstall WSL and VM but no work 😭
Here was the verbose logs from python nettacker.py -i 192.168.133.130 --profile vuln --verbose
[2024-03-05 03:52:57][+] Nettacker engine started ...
[2024-03-05 03:52:57][+] 96 modules loaded ...
[2024-03-05 03:52:57][+] regrouping targets based on hardware resources!
[2024-03-05 03:52:57][+] Removing old database record for selected targets and modules.
[2024-03-05 03:52:57][+] imported 1 targets in 1 process(es).
[2024-03-05 03:52:57][+] process-1| process is started!
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130| started module thread number 1 from 1
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 1 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 2 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 3 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 4 from 1005
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 1/1005| all conditions failed
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 0/1005| all conditions failed
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 2/1005| all conditions failed
[2024-03-05 03:52:57][+] {"timeout": 3.0, "host": "192.168.133.130", "ports": "3", "method": "tcp_connect_send_and_receive", "response": {"condition_type": "or", "ssl_flag": false, "conditions_results": []}}
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1|request-thread 3/1005| all conditions failed
[2024-03-05 03:52:57][+] process-1|port_scan|192.168.133.130|module-thread 1/1| sending request 5 from 1005
[2024-03-05 03:52:57][+] {"timeout": 3.0, "host": "192.168.133.130", "ports": "4", "method": "tcp_connect_send_and_receive", "response": {"condition_type": "or", "ssl_flag": false, "conditions_results": []}}
[2024-03-05 03:52:57][+] {"timeout": 3.0, "host": "192.168.133.130", "ports": "6", "method": "tcp_connect_send_and_receive", "response": {"condition_type": "or", "ssl_flag": false, "conditions_results": []}}
-----stuffs from port_scan --------
[2024-03-05 03:53:23][+] process-1|port_scan|192.168.133.130| finished module thread number 1 from 1
[2024-03-05 03:53:23][+] Removing old database record for selected targets and modules.
[2024-03-05 03:53:24][+] imported 1 targets in 1 process(es).
[2024-03-05 03:53:24][+] process-1| process is started!
[2024-03-05 03:53:24][+] process-1|accela_cve_2021_34370_vuln|192.168.133.130| started module thread number 1 from 61
[2024-03-05 03:53:24][+] process-1|accela_cve_2021_34370_vuln|192.168.133.130| finished module thread number 1 from 61
[2024-03-05 03:53:24][+] process-1|adobe_coldfusion_cve_2023_26360_vuln|192.168.133.130| started module thread number 2 from 61
[2024-03-05 03:53:24][+] process-1|adobe_coldfusion_cve_2023_26360_vuln|192.168.133.130| finished module thread number 2 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_41773_vuln|192.168.133.130| started module thread number 3 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_41773_vuln|192.168.133.130| finished module thread number 3 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_42013_vuln|192.168.133.130| started module thread number 4 from 61
[2024-03-05 03:53:24][+] process-1|apache_cve_2021_42013_vuln|192.168.133.130| finished module thread number 4 from 61
[2024-03-05 03:53:24][+] process-1|apache_struts_vuln|192.168.133.130| started module thread number 5 from 61
[2024-03-05 03:53:24][+] process-1|apache_struts_vuln|192.168.133.130| finished module thread number 5 from 61
------ Stuffs from called out other modules, but it just not run ----------
[2024-03-05 03:53:26][+] process-1|zoho_cve_2021_40539_vuln|192.168.133.130| finished module thread number 61 from 61
[2024-03-05 03:53:26][+] building graph ...
[2024-03-05 03:53:26][+] finish building graph!
+----------------------------+-----------------+-------------+------+----------+
| date | target | module_name | port | logs |
+============================+=================+=============+======+==========+
| 2024-03-05 03:52:57.521251 | 192.168.133.130 | port_scan | 22 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:52:57.547531 | 192.168.133.130 | port_scan | 80 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:52:57.601749 | 192.168.133.130 | port_scan | 25 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:52:57.549278 | 192.168.133.130 | port_scan | 111 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:52:57.518369 | 192.168.133.130 | port_scan | 21 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:52:59.614153 | 192.168.133.130 | port_scan | 23 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:53:03.517385 | 192.168.133.130 | port_scan | 53 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:53:03.537777 | 192.168.133.130 | port_scan | 139 | Detected |
+----------------------------+-----------------+-------------+------+----------+
| 2024-03-05 03:53:07.610454 | 192.168.133.130 | port_scan | 3306 | Detected |
+----------------------------+-----------------+-------------+------+----------+
Software Details: OWASP Nettacker version 0.3.3 [TRENT] in 2024-03-05 03:53:26
[2024-03-05 03:53:26][+] inserting report to the database
[2024-03-05 03:53:26][+] report saved in [blah blah blah link]/results_2024_03_05_03_52_54_ftulqjfclp.html and database
[2024-03-05 03:53:26][+] done!
The text was updated successfully, but these errors were encountered: