Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Crash when try to find exploits on my router #612

Closed
0MazaHacka0 opened this issue Mar 21, 2016 · 6 comments
Closed

Crash when try to find exploits on my router #612

0MazaHacka0 opened this issue Mar 21, 2016 · 6 comments

Comments

@0MazaHacka0
Copy link
Contributor

I connect to my wifi, run inspector and after that i run find exploits, but app is crashing. Here the log
http://pastebin.com/GagdyyuT

@tux-mind
Copy link
Member

Hi @0MazaHacka0 , thank for finding and submitting the bug, I just fixed it 😊

Please reproduce the problem and post a full logcat so I can see the URL that generated the parse error and fix cSploit parsers 😋

tux-mind added a commit that referenced this issue Mar 28, 2016
@rednas0812
Copy link

Can't find any exploits, here is the logcat

package org.csploit.android.tools;

/**

  • Manage android logcat
    *
  • this isn't a cSploit tool
    /
    public class Logcat extends Raw {
    /
    *
  • receive logcat output
    */
    public abstract static class FullReceiver extends RawReceiver {

private final StringBuilder sb = new StringBuilder();

@OverRide
public void onNewLine(String line) {
sb.append(line);
sb.append("\n");
}

@OverRide
final public void onEnd(int exitValue) {
onLogcat(sb.toString());
}

public abstract void onLogcat(String logcat);
}

/**

  • receive libc fatal messages from logcat
    */
    public abstract static class LibcReceiver extends FullReceiver {
    private String libcFingerprint = null;

@OverRide
public void onNewLine(String line) {
if (libcFingerprint == null) {
if(!line.contains("*** *** ***")) {
return;
}
libcFingerprint = line.substring(0, line.indexOf(':') + 1);
} else if (!line.startsWith(libcFingerprint)) {
return;
}

super.onNewLine(line);
}
}

public Logcat() {
super();
mCmdPrefix = "logcat -d";
}
}

@tux-mind
Copy link
Member

thank for your efforts @rednas0812 , but this is not what I need.

Install catlog from the app store and start record before the issue occur.
Once your search is done tap the catlog notification to stop recording.
The logcat will be in your sdcard, under the catlog directory.

@rednas0812
Copy link

Sorry this is the log,

03-30 08:02:05.630 I/Timeline(1594): Timeline: Activity_launch_request id:org.csploit.android time:347055
03-30 08:02:05.630 I/ActivityManager(974): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity} from uid 10008 on display 0
03-30 08:02:05.640 D/ResourcesManager(974): creating new AssetManager and set to /data/app/org.csploit.android-2/base.apk
03-30 08:02:05.690 I/ActivityManager(974): Start proc org.csploit.android for activity org.csploit.android/.MainActivity: pid=14634 uid=10253 gids={50253, 9997, 3003, 1028, 1015} abi=armeabi-v7a
03-30 08:02:05.760 D/ResourcesManager(14634): creating new AssetManager and set to /data/app/org.csploit.android-2/base.apk
03-30 08:02:05.900 D/ACRA (14634): ACRA is enabled for org.csploit.android, initializing...
03-30 08:02:05.930 D/ACRA (14634): Looking for error files in /data/data/org.csploit.android/files
03-30 08:02:05.930 D/ACRA (14634): Looking for error files in /data/data/org.csploit.android/files
03-30 08:02:05.950 D/CSPLOITcore.System.init: initializing System...
03-30 08:02:06.030 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.1
03-30 08:02:06.030 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.8
03-30 08:02:06.030 W/CSPLOITtools.Tool.async: nmap: disabled
03-30 08:02:06.030 W/CSPLOITtools.Tool.async: nmap: disabled
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: cannot start commands
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: org.csploit.android.core.ChildManager$ChildNotStartedException: cannot start commands
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at org.csploit.android.tools.Tool.async(Tool.java:48)
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at org.csploit.android.tools.NMap.synScan(NMap.java:142)
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at org.csploit.android.tools.NMap.synScan(NMap.java:146)
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at org.csploit.android.services.NetworkRadar$2.run(NetworkRadar.java:90)
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1112)
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:587)
03-30 08:02:06.030 E/CSPLOITcore.System.errorLogging: at java.lang.Thread.run(Thread.java:818)
03-30 08:02:06.281 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.1
03-30 08:02:06.281 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.8
03-30 08:02:06.281 W/CSPLOITtools.Tool.async: nmap: disabled
03-30 08:02:06.281 W/CSPLOITtools.Tool.async: nmap: disabled
03-30 08:02:06.291 E/cSploitClient(14634): connect_unix: connect: Connection refused
03-30 08:02:06.761 I/CSPLOITcore.KnownIssues.fromFile: issue #1 loaded from file
03-30 08:02:06.771 D/cSploitClient(14634): on_handler_list: id=6, have_stdin=0, have_stdout=1, name="tcpdump"
03-30 08:02:06.771 D/cSploitClient(14634): on_handler_list: id=1, have_stdin=1, have_stdout=1, name="raw"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=2, have_stdin=0, have_stdout=1, name="nmap"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=8, have_stdin=0, have_stdout=1, name="network-radar"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=9, have_stdin=0, have_stdout=1, name="msfrpcd"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=4, have_stdin=0, have_stdout=1, name="hydra"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=7, have_stdin=0, have_stdout=1, name="fusemounts"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=3, have_stdin=0, have_stdout=1, name="ettercap"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=0, have_stdin=0, have_stdout=0, name="blind"
03-30 08:02:06.781 D/cSploitClient(14634): on_handler_list: id=5, have_stdin=0, have_stdout=1, name="arpspoof"
03-30 08:02:06.801 I/cSploitClient(14634): start_command: child #1 started
03-30 08:02:06.801 D/CSPLOITcore.ChildManager.async: { handler='fusemounts', cmd='null' } => 1
03-30 08:02:07.091 D/CSPLOITcore.ChildManager.onEvent: received an event: StderrNewline: { line='no FUSE handlers found' }
03-30 08:02:07.091 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildEnd: { exit_status=1 }
03-30 08:02:07.091 D/CSPLOITcore.ChildManager.dispatchEvent: Child #1 exited ( exitValue=1 )
03-30 08:02:07.101 I/cSploitClient(14634): start_command: child #2 started
03-30 08:02:07.101 D/CSPLOITcore.ChildManager.async: { handler='fusemounts', cmd='null' } => 2
03-30 08:02:07.182 D/ResourcesManager(12798): creating new AssetManager and set to /data/app/org.csploit.android-2/base.apk
03-30 08:02:07.312 D/CSPLOITcore.ChildManager.onEvent: received an event: StderrNewline: { line='no FUSE handlers found' }
03-30 08:02:07.312 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildEnd: { exit_status=1 }
03-30 08:02:07.312 D/CSPLOITcore.ChildManager.dispatchEvent: Child #2 exited ( exitValue=1 )
03-30 08:02:07.322 I/CSPLOITservices.NetworkRadar.onAutoScanChanged: autoScan has been set to true
03-30 08:02:07.322 D/CSPLOITservices.UpdateChecker.run: Service started.
03-30 08:02:07.322 I/cSploitClient(14634): start_command: child #3 started
03-30 08:02:07.332 D/CSPLOITcore.ChildManager.async: { handler='network-radar', cmd='wlan0' } => 3
03-30 08:02:07.342 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.1
03-30 08:02:07.342 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.8
03-30 08:02:07.342 I/cSploitClient(14634): start_command: child #4 started
03-30 08:02:07.342 D/CSPLOITcore.ChildManager.async: { handler='nmap', cmd='-sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.1' } => 4
03-30 08:02:07.352 I/cSploitClient(14634): start_command: child #5 started
03-30 08:02:07.352 D/CSPLOITcore.ChildManager.async: { handler='nmap', cmd='-sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.8' } => 5
03-30 08:02:07.352 D/CSPLOITnet.RemoteReader.run: RemoteReader[api.github.com] started
03-30 08:02:07.352 I/CSPLOITnet.RemoteReader.run: fetching 'https://api.github.com/repos/cSploit/android/releases'
03-30 08:02:07.462 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[C0:3F:0E:50:4D:E4], ipAddress='10.0.0.1', name='null' }
03-30 08:02:07.602 W/CSPLOITservices.MsfRpcdService.connect: java.net.ConnectException: failed to connect to /127.0.0.1 (port 55553): connect failed: ECONNREFUSED (Connection refused)
03-30 08:02:07.622 I/cSploitClient(14634): start_command: child #6 started
03-30 08:02:07.622 D/CSPLOITcore.ChildManager.async: { handler='msfrpcd', cmd='-P 'msf' -U 'msf' -p '55553' -a 127.0.0.1 -n -S -t Msg -f' } => 6
03-30 08:02:07.692 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=53, service='null', version='null' }
03-30 08:02:07.692 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=23, service='null', version='null' }
03-30 08:02:07.702 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=80, service='null', version='null' }
03-30 08:02:07.732 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[B8:EE:65:6D:23:7C], ipAddress='10.0.0.4', name='null' }
03-30 08:02:07.732 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.4
03-30 08:02:07.742 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[84:38:38:D7:15:B4], ipAddress='10.0.0.7', name='null' }
03-30 08:02:07.752 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[78:A2:A0:AE:F4:9E], ipAddress='10.0.0.5', name='null' }
03-30 08:02:07.752 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.7
03-30 08:02:07.782 I/cSploitClient(14634): start_command: child #7 started
03-30 08:02:07.782 D/CSPLOITcore.ChildManager.async: { handler='nmap', cmd='-sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.4' } => 7
03-30 08:02:07.782 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[F0:92:1C:D6:9C:2B], ipAddress='10.0.0.3', name='null' }
03-30 08:02:07.792 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.5
03-30 08:02:07.812 I/cSploitClient(14634): start_command: child #8 started
03-30 08:02:07.822 D/CSPLOITcore.ChildManager.async: { handler='nmap', cmd='-sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.7' } => 8
03-30 08:02:07.822 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=5000, service='null', version='null' }
03-30 08:02:07.832 D/CSPLOITtools.NMap.synScan: synScan - -sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.3
03-30 08:02:07.852 I/cSploitClient(14634): start_command: child #9 started
03-30 08:02:07.882 D/CSPLOITcore.ChildManager.async: { handler='nmap', cmd='-sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.5' } => 9
03-30 08:02:07.902 I/cSploitClient(14634): start_command: child #10 started
03-30 08:02:07.912 D/CSPLOITcore.ChildManager.async: { handler='nmap', cmd='-sS -P0 --privileged --send-ip --system-dns -vvv 10.0.0.3' } => 10
03-30 08:02:08.042 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[B8:EE:65:6D:23:7C], ipAddress='10.0.0.4', name='REDNAS-PC' }
03-30 08:02:08.112 D/CSPLOITcore.ChildManager.onEvent: received an event: Host: { ethAddress=[F0:92:1C:D6:9C:2B], ipAddress='10.0.0.3', name='HPD69C2B' }
03-30 08:02:08.112 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildEnd: { exit_status=0 }
03-30 08:02:08.112 D/CSPLOITcore.ChildManager.dispatchEvent: Child #4 exited ( exitValue=0 )
03-30 08:02:08.233 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=445, service='null', version='null' }
03-30 08:02:08.233 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=139, service='null', version='null' }
03-30 08:02:08.243 I/ActivityManager(974): Displayed org.csploit.android/.MainActivity: +2s576ms
03-30 08:02:08.243 I/Timeline(974): Timeline: Activity_windows_visible id: ActivityRecord{23d524be u0 org.csploit.android/.MainActivity t142} time:349675
03-30 08:02:08.303 D/ResourcesManager(1457): creating new AssetManager and set to /data/app/org.csploit.android-2/base.apk
03-30 08:02:08.303 D/ResourcesManager(1355): creating new AssetManager and set to /data/app/org.csploit.android-2/base.apk
03-30 08:02:08.373 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=443, service='null', version='null' }
03-30 08:02:08.483 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=80, service='null', version='null' }
03-30 08:02:08.483 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=8080, service='null', version='null' }
03-30 08:02:08.743 D/CSPLOITservices.UpdateChecker.getApkUpdate: localVersion = 1.6.6-rc.1
03-30 08:02:08.743 D/CSPLOITservices.UpdateChecker.getApkUpdate: remoteVersion = 1.6.5
03-30 08:02:08.763 I/CSPLOITnet.RemoteReader.run: fetching 'https://api.github.com/repos/cSploit/android.native/releases'
03-30 08:02:08.783 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=9100, service='null', version='null' }
03-30 08:02:08.9

@tux-mind
Copy link
Member

i cannot see any crash @rednas0812

please use catlog and share the logcat in a convenient way.
Maybe github truncated your logcat. you can attach files to issue's posts 😉

@rednas0812
Copy link

Is this one good?

03-31 18:07:53.798 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildEnd: { exit_status=0 }
03-31 18:07:53.808 D/CSPLOITcore.ChildManager.dispatchEvent: Child #9 exited ( exitValue=0 )
03-31 18:07:58.152 D/StautsBar-RecentsTaskLoader(1357): getTaskStack id: 567 label:cSploit
03-31 18:07:58.782 D/ResourcesManager(22533): creating new AssetManager and set to /data/app/org.csploit.android-1/base.apk
03-31 18:07:58.792 W/PackageManager(22533): Failure retrieving resources for org.csploit.android: Resource ID #0x0
03-31 18:07:58.813 D/StautsBar-RecentsTaskLoader(22533): getTaskStack id: 567 label:cSploit
03-31 18:07:59.053 D/Recents_TaskViewHeader(22533): rebindToTask task=Task (567): org.csploit.android [com.android.systemui.recents.model.Task@15c2a359]
03-31 18:08:00.544 I/Timeline(1066): Timeline: Activity_windows_visible id: ActivityRecord{373bcbdb u0 org.csploit.android/.plugins.Inspector t567} time:39323657
03-31 18:08:01.545 D/ResourcesManager(1066): creating new AssetManager and set to /data/app/org.csploit.android-1/base.apk
03-31 18:08:01.785 I/Timeline(1066): Timeline: Activity_windows_visible id: ActivityRecord{ce894d7 u0 org.csploit.android/.ActionActivity t567} time:39324899
03-31 18:08:03.137 D/CSPLOITcore.System.setCurrentPlugin: Setting current plugin : Exploit vinder
03-31 18:08:03.147 I/Timeline(19895): Timeline: Activity_launch_request id:org.csploit.android time:39326252
03-31 18:08:03.147 I/ActivityManager(1066): START u0 {cmp=org.csploit.android/.plugins.ExploitFinder} from uid 10256 on display 0
03-31 18:08:03.397 I/ActivityManager(1066): Displayed org.csploit.android/.plugins.ExploitFinder: +222ms
03-31 18:08:03.627 I/Timeline(1066): Timeline: Activity_windows_visible id: ActivityRecord{22d6f572 u0 org.csploit.android/.plugins.ExploitFinder t567} time:39326735
03-31 18:08:03.637 V/ActivityThread(19895): updateVisibility : ActivityRecord{3beaea7c token=android.os.BinderProxy@d181c31 {org.csploit.android/org.csploit.android.ActionActivity}} show : false
03-31 18:08:03.877 I/NotificationService(1066): cancelToast pkg=org.csploit.android callback=android.app.ITransientNotification$Stub$Proxy@2bfad23b
03-31 18:08:03.938 D/CSPLOITnet.datasource.Rapid7.beginSearch: url = 'http://www.rapid7.com/db/search?q=netbios-ssn&t=m'
03-31 18:08:03.938 D/CSPLOITnet.RemoteReader.run: RemoteReader[www.rapid7.com] started
03-31 18:08:03.938 D/CSPLOITnet.datasource.ExploitDb.beginSearch: url = 'http://www.exploit-db.com/search/?action=search&filter_description=netbios-ssn'
03-31 18:08:03.938 I/CSPLOITnet.RemoteReader.run: fetching 'http://www.rapid7.com/db/search?q=netbios-ssn&t=m'
03-31 18:08:03.938 D/CSPLOITnet.datasource.Rapid7.beginSearch: url = 'http://www.rapid7.com/db/search?q=netbios-ssn&t=m'
03-31 18:08:03.938 D/CSPLOITnet.datasource.ExploitDb.beginSearch: url = 'http://www.exploit-db.com/search/?action=search&filter_description=netbios-ssn'
03-31 18:08:03.938 D/CSPLOITnet.datasource.Rapid7.beginSearch: url = 'http://www.rapid7.com/db/search?q=globe&t=m'
03-31 18:08:03.938 D/CSPLOITnet.RemoteReader.run: RemoteReader[www.exploit-db.com] started
03-31 18:08:03.938 D/CSPLOITnet.datasource.ExploitDb.beginSearch: url = 'http://www.exploit-db.com/search/?action=search&filter_description=globe'
03-31 18:08:03.938 I/CSPLOITnet.RemoteReader.run: fetching 'http://www.exploit-db.com/search/?action=search&filter_description=netbios-ssn'
03-31 18:08:04.108 I/CSPLOITnet.RemoteReader.run: fetching 'http://www.rapid7.com/db/search?q=netbios-ssn&t=m'
03-31 18:08:04.128 I/CSPLOITnet.RemoteReader.run: fetching 'http://www.rapid7.com/db/search?q=globe&t=m'
03-31 18:08:04.358 I/CSPLOITnet.RemoteReader.run: fetching 'http://www.exploit-db.com/search/?action=search&filter_description=netbios-ssn'
03-31 18:08:04.498 I/CSPLOITnet.RemoteReader.run: fetching 'http://www.exploit-db.com/search/?action=search&filter_description=globe'
03-31 18:08:07.241 V/ActivityThread(19895): updateVisibility : ActivityRecord{9140a58 token=android.os.BinderProxy@2385a399 {org.csploit.android/org.csploit.android.plugins.ExploitFinder}} show : false
03-31 18:08:07.651 D/ResourcesManager(22533): creating new AssetManager and set to /data/app/org.csploit.android-1/base.apk
03-31 18:08:07.651 W/PackageManager(22533): Failure retrieving resources for org.csploit.android: Resource ID #0x0
03-31 18:08:07.671 D/StautsBar-RecentsTaskLoader(22533): getTaskStack id: 567 label:cSploit
03-31 18:08:07.731 D/Recents_TaskViewHeader(22533): rebindToTask task=Task (567): org.csploit.android [com.android.systemui.recents.model.Task@18469401]
03-31 18:09:22.965 D/CSPLOITcore.ChildManager.onEvent: received an event: Port: { protocol='tcp', port=5357, service='null', version='null' }

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants