If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Anonymous
Anonymous
-
2018-07-04
im using netool[kali].tar.gz distro and i got the ERROR tar java-exploit.tar.gz cant open no suck file on directory .priv8.sh 2731 ......... as in the previous screenshot i posted on the 23/06/2018.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Using up to date Kali, and Metasploit I'm having a problem installing Metasploit.
Actually, I already have MSF insalled, however when I use your tool,it says I need to install it. There should be a way I could use my existing MSF, is there a way I can easily update the location? Same with Webcrawler.py.
bug report
[-] (Your choice?):9[*][priv8.sh]: installation found...[x][warning]: this module required Metasploit instaled to work...[+] more info here: http://l3w0nx.blogspot.pt/2012/03/install-metasploit-latest-linux.html
Thinking I'll re-install it, I followed the directions within the script,
and MSF is failing to install here:
my metasploit install its on version "4-4.0" so my tool will point
to that directory in search of MSF, a simple fix will be replace the path of 'metasploit' current install in 'priv8.sh' and 'netool.sh' script.
'sudo' its to run a command as 'root' user, in kali-distros we are 'root' users by default (no need for sudo), and its 'chmod +x' and not 'chmod + x'...
so the rigth command it will be:
'chmod +x metasploit-latest-linux-installer.run'
and then './metasploit-latest-linux-installer.run'
(but we dont need to install the metasploit again...)
Last edit: pedro ubuntu 2015-07-25
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
iam using netool.sh V3.3 for KALI-LINUX distro
in the module 9 [rootsector exploits] / 4,5,6 [clone website],
metasploit-framework displays the following error:
bug report
[09/29/2013 00:15:44] [e(0)] core:
/opt/metasploit/apps/pro/msf3/modules/post/windows/manage/portproxy.rb failed to load due to the following error:
NameError
uninitialized constant Msf::Post::Windows
Call stack:
/opt/metasploit/apps/pro/msf3/modules/post/windows/manage/portproxy.rb:10:in <class:metasploit3>' /opt/metasploit/apps/pro/msf3/modules/post/windows/$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:54:in module_eval' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.r$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:147:in block in load_module' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loa$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:553:in namespace_module_transaction' /opt/metasploit/apps/pro/msf3/lib/msf/core/mod$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:271:in block in load_modules' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/lo$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/directory.rb:60:in each' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/director$
/opt/metasploit/apps/pro/msf3/lib/rex/file.rb:127:in block in find' /opt/metasploit/apps/pro/msf3/lib/rex/file.rb:126:incatch'
/opt/metasploit/apps/pro/msf3/lib/rex/file.rb:126:in find' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/directory.rb:45:inblock in each_$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/directory.rb:29:in foreach' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/direc$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:264:in load_modules' /opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/load$
/opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/loading.rb:116:in each' /opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/loading.r$
/opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/module_paths.rb:56:in block in add_module_path' /opt/metasploit/apps/pro/msf3/lib/msf/core/$
/opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/module_paths.rb:55:in add_module_path' /opt/metasploit/apps/pro/msf3/lib/msf/base/simple/fr$
/opt/metasploit/apps/pro/msf3/msfcli:298:in init_modules' /opt/metasploit/apps/pro/msf3/msfcli:535:inrun!'
/opt/metasploit/apps/pro/msf3/msfcli:557:in `'</class:metasploit3>
and metasploit fail/crash .... thanks
Last edit: pedro ubuntu 2013-11-25
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
i belive that if your have the 'metasploit' corrupted
the better soluction will bee installing again the KALI-LINUX
distro (metasploit its allready installed by default)..
and then my tool will work...
Last edit: pedro ubuntu 2013-11-25
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
iam using netool.sh V3.3 for ubuntu distro
the module 'priv8.sh' displays the following error:
bug report
[-] (Your choice?):9[*][priv8.sh]: installation found...[x][warning]: this module required Metasploit instaled to work...[+] more info here: http://l3w0nx.blogspot.pt/2012/03/install-metasploit-latest-linux.html
Last edit: pedro ubuntu 2013-10-22
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
ubuntu = /home/username/opensource
kali = /root/opensource
(if the tool as not installed in the rigth path then it will give errors)
my metasploit install its on version "4-4.0" so my tool will point
to that directory in search of MSF, a simple fix will be replace the path of 'metasploit' current install in 'priv8.sh' and 'netool.sh' script.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Anonymous
Anonymous
-
2014-03-11
bug report
[-] (Your choice?):9./netool.sh: 2524: cd: can't cd to /root/opensource[*][priv8.sh]: installation found..../netool.sh: 2528: cd: can't cd to /root/opensource/modules
Last edit: pedro ubuntu 2014-03-23
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
my tool dont use 'absoluct paths' to work, so it as to be installed on the rigth location to work proper, and your bug report shows that my tool its not installed in the rigth path, or that you have downloaded the wrong version of my tool for you OS.
[Download netool.sh for UBUNTU](https://sourceforge.net/projects/netoolsh/files/opensource.tar.gz/download "Download netool.sh for linux-Ubuntu-distros")
"install path in linux-ubuntu":
unpack "opensource.tar.gz" under "/home/username" folder
example: (home/username/opensource)
[Download netool.sh for KALI](https://sourceforge.net/projects/netoolsh/files/opensource%5Bkali%5D.tar.gz/download "Download netool.sh for kali-linux-distros")
"install path in kali-linux":unpack"opensource[kali].tar.gz"under"/root"folderexample:(/root/opensource)
another soluction will be:
edit the file "netool.sh" search for 'Path to instalations and variaveis do script' and then replace the paths for the rigth ones depending of your operative system configuration.
edit the file "priv8.sh" search for 'path to frameworks installed' and then replace the paths for the rigth ones depending of your operative system configuration.
hello, ive try to re-install the toolkit again on my ubuntu
to repair the bug, but i didnt find any bug on it, since in my installation
it works perfect (sslstrip module)...
questions
1 - do you have python installed on your OS?
2 - do you have give root permitions for all files.py?
cd opensource/ssslstrip-0.9 && chmod +x *.py
my tool in the first run (sslstrip module) will search in the folder "opensource/sslstrip-0.9" for the file "installed"
if it dosent find the file it starts installing sslstrip
using "setup.py" file, after sslstrip installed you will see
"installed" file and "build" folder...
so check in "opensource/sslstrip-0.9" if "build" folder exists,
and if "installed" file exists <-- this meens that the sslstrip as installed proper...
As per the man pages, it needs an extra / in the target selection because of the IPv6 capability. we have been using ettercap agains IPV4 and the new protocol IPV6 seems to work diferent,
how to fix it
edit 'netoo.sh' and 'priv8.sh' and insert an extra / in the target selection
ettercap -T -M arp /// ///
OR
ettercap -T -M arp //$target/ /$router//
should work...
Last edit: pedro ubuntu 2015-09-28
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Anonymous
Anonymous
-
2015-02-19
This is On kali
[*] Initializing modules... [-] Failed to connect to the database: could not connect to server: Connection refused
Is the server running on host "localhost" (::1) and accepting
TCP/IP connections on port 5432?
could not connect to server: Connection refused
Is the server running on host "localhost" (127.0.0.1) and accepting
TCP/IP connections on port 5432?
hello hax0r, But that error display its not my toolkit (netool.sh t00lkit) fault, this is a metasploit internal error or you are not connected to network, but i belive that possible causes are:
1º - you did not have started the postgres service on your machine
(90% sure of that)
service postgresql start
2º - You can verify that PostgreSQL is running by checking the output
of [ ss -ant | egrep "5432" ] and making sure that port 5432 is listening.
State Recv-Q Send-Q Local Address:Port Peer Address:Port
LISTEN 0 128 127.0.0.1:5432 *:*
LISTEN 0 128 ::1:5432 :::*
3º - Start the Kali Metasploit Service
service metasploit start
4º - check if everything its OK...
Now that the PostgreSQL an Metasploit services are running,
you can launch msfconsole and verify database connectivity
with the db_status command as shown below.
Last edit: pedro ubuntu 2015-07-25
i have got this errror while using it please need help
im using netool[kali].tar.gz distro and i got the ERROR tar java-exploit.tar.gz cant open no suck file on directory .priv8.sh 2731 ......... as in the previous screenshot i posted on the 23/06/2018.
[ Strahinja Prvulovic ]
i cannot open webcrawler on your netool...
I have make chmod +x webcrawer.py
and all but does not work
bug report
Last edit: pedro ubuntu 2015-07-25
soluction
my tool dont use 'absoluct paths' to work, so it as
to be installed on the rigth location to work proper...
final notes
your error shows that my tool its not installed in the rigth path
Last edit: pedro ubuntu 2013-11-25
[ Strahinja Prvulovic ]
module webcrawler.py
bug report
Last edit: pedro ubuntu 2013-10-22
soluction
install the packet "BeautifulSoup"
(Beautiful Soup is a Python library for parsing HTML documents).
Last edit: pedro ubuntu 2013-11-25
[ Andrzej Wysocki ]
netool gives me a error when installing..
on backtrack linux distro
bug report
Last edit: pedro ubuntu 2013-10-22
soluction
ok it seems that ettercap-gtk (ettercap GUI) was removed from repos
[so install it using ubuntu software center, or synaptic packet manager],
it seems that macchanger-gtk (macchanger GUI) was removed from repos
to [so install it using ubuntu software center, or synaptic packet manager],
another soluction will be:
(config only for netool.sh-backtrack distro)
edit the file "netool.sh" and search for
'Path to instalations and variaveis do script'
then replace the paths for the rigth ones
Last edit: pedro ubuntu 2015-07-25
Using up to date Kali, and Metasploit I'm having a problem installing Metasploit.
Actually, I already have MSF insalled, however when I use your tool,it says I need to install it. There should be a way I could use my existing MSF, is there a way I can easily update the location? Same with Webcrawler.py.
bug report
Thinking I'll re-install it, I followed the directions within the script,
and MSF is failing to install here:
Thank you...
Last edit: pedro ubuntu 2013-11-25
if you are using kali-linux distro then 'metasploit' its allready installed by default (we dont need to install it again...)
soluction
download 'netool.sh' for kali-distro from here:
netool.sh kali-distros
video tutorial
another soluction will be
my metasploit install its on version "4-4.0" so my tool will point
to that directory in search of MSF, a simple fix will be replace the path of 'metasploit' current install in 'priv8.sh' and 'netool.sh' script.
[edit 'netool.sh' and replace the follow line]
[edit 'priv8.sh' and replace the follow line]
final notes
'sudo' its to run a command as 'root' user, in kali-distros we are 'root' users by default (no need for sudo), and its 'chmod +x' and not 'chmod + x'...
so the rigth command it will be:
'chmod +x metasploit-latest-linux-installer.run'
and then './metasploit-latest-linux-installer.run'
(but we dont need to install the metasploit again...)
Last edit: pedro ubuntu 2015-07-25
[Anggriyanto Pangaribuan]
bug report
Last edit: pedro ubuntu 2013-10-22
soluction
[edit 'netool.sh' and replace the follow line]
[edit 'priv8.sh' and replace the follow line]
Last edit: pedro ubuntu 2013-11-25
Hello,
iam using netool.sh V3.3 for KALI-LINUX distro
in the module 9 [rootsector exploits] / 4,5,6 [clone website],
metasploit-framework displays the following error:
bug report
/opt/metasploit/apps/pro/msf3/modules/post/windows/manage/portproxy.rb failed to load due to the following error:
NameError
uninitialized constant Msf::Post::Windows
Call stack:
/opt/metasploit/apps/pro/msf3/modules/post/windows/manage/portproxy.rb:10:in <class:metasploit3>' /opt/metasploit/apps/pro/msf3/modules/post/windows/$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:54:in module_eval' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.r$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:147:in block in load_module' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loa$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:553:in namespace_module_transaction' /opt/metasploit/apps/pro/msf3/lib/msf/core/mod$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:271:in block in load_modules' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/lo$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/directory.rb:60:in each' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/director$
/opt/metasploit/apps/pro/msf3/lib/rex/file.rb:127:in block in find' /opt/metasploit/apps/pro/msf3/lib/rex/file.rb:126:incatch'
/opt/metasploit/apps/pro/msf3/lib/rex/file.rb:126:in find' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/directory.rb:45:inblock in each_$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/directory.rb:29:in foreach' /opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/direc$
/opt/metasploit/apps/pro/msf3/lib/msf/core/modules/loader/base.rb:264:in load_modules' /opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/load$
/opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/loading.rb:116:in each' /opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/loading.r$
/opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/module_paths.rb:56:in block in add_module_path' /opt/metasploit/apps/pro/msf3/lib/msf/core/$
/opt/metasploit/apps/pro/msf3/lib/msf/core/module_manager/module_paths.rb:55:in add_module_path' /opt/metasploit/apps/pro/msf3/lib/msf/base/simple/fr$
/opt/metasploit/apps/pro/msf3/msfcli:298:in init_modules' /opt/metasploit/apps/pro/msf3/msfcli:535:inrun!'
/opt/metasploit/apps/pro/msf3/msfcli:557:in `'</class:metasploit3>
and metasploit fail/crash .... thanks
Last edit: pedro ubuntu 2013-11-25
question:
this bug only happens in [rootsector] modules 4,5,6
(did the other modules in r00tsect0r works fine ???)
final notes
for your bug report i belive that the 'metasploit'
installation in your KALI-LINUX its corrupted...
(can you use msfconsole on your PC ???)
i belive that if your have the 'metasploit' corrupted
the better soluction will bee installing again the KALI-LINUX
distro (metasploit its allready installed by default)..
and then my tool will work...
Last edit: pedro ubuntu 2013-11-25
[ Sem Anony ]
iam using netool.sh V3.3 for ubuntu distro
the module 'priv8.sh' displays the following error:
bug report
Last edit: pedro ubuntu 2013-10-22
soluction:
[opensource folder as to be installed in]
(if the tool as not installed in the rigth path then it will give errors)
my metasploit install its on version "4-4.0" so my tool will point
to that directory in search of MSF, a simple fix will be replace the path of 'metasploit' current install in 'priv8.sh' and 'netool.sh' script.
[edit 'netool.sh' and replace the follow line]
[edit 'priv8.sh' and replace the follow line]
.
bug report
Last edit: pedro ubuntu 2014-03-23
soluction
my tool dont use 'absoluct paths' to work, so it as to be installed on the rigth location to work proper, and your bug report shows that my tool its not installed in the rigth path, or that you have downloaded the wrong version of my tool for you OS.
another soluction will be:
edit the file "netool.sh" search for 'Path to instalations and variaveis do script' and then replace the paths for the rigth ones depending of your operative system configuration.
edit the file "priv8.sh" search for 'path to frameworks installed' and then replace the paths for the rigth ones depending of your operative system configuration.
[BUG report - thantserpelis]
actually i found an error so i thought to tell u using the sslstrip
doesnt work probably the setup.py has an error this is what i got error:
Last edit: pedro ubuntu 2014-06-14
soluction
hello, ive try to re-install the toolkit again on my ubuntu
to repair the bug, but i didnt find any bug on it, since in my installation
it works perfect (sslstrip module)...
questions
1 - do you have python installed on your OS?
2 - do you have give root permitions for all files.py?
my tool in the first run (sslstrip module) will search in the folder "opensource/sslstrip-0.9" for the file "installed"
if it dosent find the file it starts installing sslstrip
using "setup.py" file, after sslstrip installed you will see
"installed" file and "build" folder...
so check in "opensource/sslstrip-0.9" if "build" folder exists,
and if "installed" file exists <-- this meens that the sslstrip as installed proper...
check here the screenshots
https://db.tt/15ZcXXfy
https://db.tt/NmKDfGeC
Last edit: pedro ubuntu 2014-06-14
Incorrect number of token (///) in TARGET !!
cd opensource/netool.sh
driftnet -i $interface -d ~/opensource/netool-capture & ettercap -T -Q -i $interface -M arp //$targ/ /$rou//
OK :)
taken from ettercap maling list webpage:
http://sourceforge.net/.../mailman/ettercap-betatesting/
As per the man pages, it needs an extra / in the target selection because of the IPv6 capability. we have been using ettercap agains IPV4 and the new protocol IPV6 seems to work diferent,
how to fix it
edit 'netoo.sh' and 'priv8.sh' and insert an extra / in the target selection
Last edit: pedro ubuntu 2015-09-28
This is On kali
[*] Initializing modules...
[-] Failed to connect to the database: could not connect to server: Connection refused
Is the server running on host "localhost" (::1) and accepting
TCP/IP connections on port 5432?
could not connect to server: Connection refused
Is the server running on host "localhost" (127.0.0.1) and accepting
TCP/IP connections on port 5432?
APPLETNAME => microsoft
TARGET => 0
PAYLOAD => java/meterpreter/reverse_tcp
LHOST => 192.168.1.106
URIPATH => /support
[*] Exploit running as background job.
hello hax0r, But that error display its not my toolkit (netool.sh t00lkit) fault, this is a metasploit internal error or you are not connected to network, but i belive that possible causes are:
1º - you did not have started the postgres service on your machine
(90% sure of that)
2º - You can verify that PostgreSQL is running by checking the output
of [ ss -ant | egrep "5432" ] and making sure that port 5432 is listening.
3º - Start the Kali Metasploit Service
4º - check if everything its OK...
Now that the PostgreSQL an Metasploit services are running,
you can launch msfconsole and verify database connectivity
with the db_status command as shown below.
P.S: this is not a bug on my toolkit
Last edit: pedro ubuntu 2015-02-20