-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error running sigploit.py with python 2.7.1 and Java 1.8 #216
Comments
use python 3.6 |
Code is written in python2. Running with python 3 outputs an error |
Both of python 2 and 3 show error, python 3 show more error than python version 2. |
just download all the depencese
Envoyé depuis ProtonMail mobile
…-------- Message d'origine --------
Le 25 janv. 2021 à 8:55 PM, Ripon Chandra das a écrit :
Both of python 2 and 3 show error, python 3 show more error than python version 2.
There is any solution please?
—
You are receiving this because you commented.
Reply to this email directly, [view it on GitHub](#216 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/ARXPHNLIKL5VTEV77AIEKUDS3XEELANCNFSM4VYSRF5Q).
|
What do you mean by "Envoyé depuis ProtonMail mobile"? |
envoyé depuis ProtonMail mobile mean i send this email with the app protonmail mobile from my phone
Envoyé depuis ProtonMail mobile
…-------- Message d'origine --------
Le 25 janv. 2021 à 9:50 PM, Ripon Chandra das a écrit :
What do you mean by "Envoyé depuis ProtonMail mobile"?
Please write details.
—
You are receiving this because you commented.
Reply to this email directly, [view it on GitHub](#216 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/ARXPHNLTDTJZOHEQTYYG3JDS3XKSZANCNFSM4VYSRF5Q).
|
Hey, i've got the solution for the problem :
|
I Have same problem guys any help... |
Chat me on whatsapp for assistance
+12028885222
Sent from ProtonMail mobile
…-------- Original Message --------
On Mar 6, 2021, 10:22 AM, aNDOhACK wrote:
I Have same problem guys any help...
raceback (most recent call last):
File "sigploit.py", line 16, in
from ss7.tracking import *
File "/home//Downloads/SigPloit-master/ss7/tracking.py", line 14, in
import sigploit
File "/home//Downloads/SigPloit-master/sigploit.py", line 21, in
from gtpmain import *
File "/home//Downloads/SigPloit-master/gtpmain.py", line 12, in
import gtp.info
File "/home//Downloads/SigPloit-master/gtp/info.py", line 18, in
from attacks.info import discover_gtp_nodes
File "/home//Downloads/SigPloit-master/gtp/attacks/info/discover_gtp_nodes.py", line 39, in
from gtp_v2_core.utilities.configuration_parser import parseConfigs
File "/home//Downloads/SigPloit-master/gtp/gtp_v2_core/utilities/configuration_parser.py", line 38, in
from configobj import ConfigObj, ConfigObjError
ImportError: No module named configobj
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, [view it on GitHub](#216 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/AMDPV5UPH5OTAVCFG3KS4XDTCHX3TANCNFSM4VYSRF5Q).
|
try a dif distro. I had problems on kali but it works fine on CentOS |
It is working. Do as TheCrazzXz said, it is working. |
@partalian Yes, and, i'm pretty much sure you didn't buy the usb device you have to use to intercept s77... But yea, instead of intercepting ss7 messages (and being a Script Kiddie), try to learn real hacking, try to learn programming languages (other than python) like C, C++ and even Assembly (yes Assembly is harder than programming languages and reaaaaly low level, but it's nice to understand how your program with binary instructions (translated in Assembly language), in fact it's not so hard, i don't know, if i can give you some exploits (plese note that i ain't pretending i'm a "hacker" and i ain't) Please stop learning using Kali linux softwares, or at least, you can learn it at the beggining, the beggining where everyone is a noob, because it's not by learning to use their command line that you will become a "hacker" and find vulnerabilities on a system, by using these softwares, you just exploits some of the insecured things that exists unless you add the security, or at most you will exploit some known vulnerabilities, please consider making your own programs (you should use low level languages like C or C++) like trojans, cryptography (which is important in cyber-sec), and it's justly how you will be able to bypass anti-viruses, not by using metasploit or veil-evasion or even thefatrat or else, no create your own trojans and try just i don't know, you can do weird and stupid things to like scame the antivirus, there are 1M+ methods to bypass antivirus, you can bypass it simply to really advanced things... Or... You can use something else which is... Cryptography, by encrypting the binary content of an executable, the antivirus will not be able to read the binary instructions of the encrypted program, then you can decrypt it with the key (you can also encode it instead of encrypt it) Anyways, a long answer isn't it ? |
Hi CazzXz,
Thanks for the long answer, I love these ones.
I used to do some programming many many years ago, I did some encrypting to bypass viruses and I recall it was something to do with the “title” or “header” of that file and binaries too.
I agree with you regarding everything you said and that one should learn to code so that the solution you can bring is one unique and independent of any existing exploits that speculate the “now” moment and one should understand beyond the obvious step by step commands.
I like researching and indeed again coding is a game changer regardless of what you want to do.
Many thanks again.
Sent from ProtonMail for iOS
…On Tue, May 18, 2021 at 22:04, TheCazzXz ***@***.***> wrote:
***@***.***(https://github.com/partalian) Yes, and, i'm pretty much sure you didn't buy the usb device you have to use to intercept s77...
I heard that it costs about 150$ something like that...
Yeah, nothing is free ! Unfortunaly it's true
Well, sorry to disapoint y'all but sigslot ain't gonna work unless you have the usb external ss7 interceptor...
(I don't have it)
But yea, instead of intercepting ss7 messages (and being a Script Kiddie), try to learn real hacking, try to learn programming languages (other than python) like C, C++ and even Assembly (yes Assembly is harder than programming languages and reaaaaly low level, but it's nice to understand how your program with binary instructions (translated in Assembly language), in fact it's not so hard, i don't know, if i can give you some exploits (plese note that i ain't pretending i'm a "hacker" and i ain't)
If you want some (known) exploits you can learn Stack Buffer Overflow, Buffer Overruns... Welp that's not so hard, but you should learn programming at low or very low level, please trust me, it's what makes you a real "hacker" worthy of the name
Learn binary, learn how to memory, the processor works in your computer and who knows, maybe someone like you will find system vulnerabilities, note that the term of "hacking" means to change the behaviour of a system to make it do what we want to
Please stop learning using Kali linux softwares, or at least, you can learn it at the beggining, the beggining where everyone is a noob, because it's not by learning to use their command line that you will become a "hacker" and find vulnerabilities on a system, by using these softwares, you just exploits some of the insecured things that exists unless you add the security, or at most you will exploit some known vulnerabilities, please consider making your own programs (you should use low level languages like C or C++) like trojans, cryptography (which is important in cyber-sec), and it's justly how you will be able to bypass anti-viruses, not by using metasploit or veil-evasion or even thefatrat or else, no create your own trojans and try just i don't know, you can do weird and stupid things to like scame the antivirus, there are 1M+ methods to bypass antivirus, you can bypass it simply to really advanced things... Or... You can use something else which is... Cryptography, by encrypting the binary content of an executable, the antivirus will not be able to read the binary instructions of the encrypted program, then you can decrypt it with the key (you can also encode it instead of encrypt it)
Anyways, a long answer isn't it ?
—
You are receiving this because you were mentioned.
Reply to this email directly, [view it on GitHub](#216 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/AUCSJAS3OU5S2WRFVJXLIH3TOLI6XANCNFSM4VYSRF5Q).
|
By the way, I will buy the scottgadgets’ device, but the question is: will you be able to tap into ss7 with that? Or is it just to “catch” close by signal from other phones?
I am looking into this matter. Is that device enough to access the ss7 network?
Thanks again.
Sent from ProtonMail for iOS
…On Tue, May 18, 2021 at 22:04, TheCazzXz ***@***.***> wrote:
***@***.***(https://github.com/partalian) Yes, and, i'm pretty much sure you didn't buy the usb device you have to use to intercept s77...
I heard that it costs about 150$ something like that...
Yeah, nothing is free ! Unfortunaly it's true
Well, sorry to disapoint y'all but sigslot ain't gonna work unless you have the usb external ss7 interceptor...
(I don't have it)
But yea, instead of intercepting ss7 messages (and being a Script Kiddie), try to learn real hacking, try to learn programming languages (other than python) like C, C++ and even Assembly (yes Assembly is harder than programming languages and reaaaaly low level, but it's nice to understand how your program with binary instructions (translated in Assembly language), in fact it's not so hard, i don't know, if i can give you some exploits (plese note that i ain't pretending i'm a "hacker" and i ain't)
If you want some (known) exploits you can learn Stack Buffer Overflow, Buffer Overruns... Welp that's not so hard, but you should learn programming at low or very low level, please trust me, it's what makes you a real "hacker" worthy of the name
Learn binary, learn how to memory, the processor works in your computer and who knows, maybe someone like you will find system vulnerabilities, note that the term of "hacking" means to change the behaviour of a system to make it do what we want to
Please stop learning using Kali linux softwares, or at least, you can learn it at the beggining, the beggining where everyone is a noob, because it's not by learning to use their command line that you will become a "hacker" and find vulnerabilities on a system, by using these softwares, you just exploits some of the insecured things that exists unless you add the security, or at most you will exploit some known vulnerabilities, please consider making your own programs (you should use low level languages like C or C++) like trojans, cryptography (which is important in cyber-sec), and it's justly how you will be able to bypass anti-viruses, not by using metasploit or veil-evasion or even thefatrat or else, no create your own trojans and try just i don't know, you can do weird and stupid things to like scame the antivirus, there are 1M+ methods to bypass antivirus, you can bypass it simply to really advanced things... Or... You can use something else which is... Cryptography, by encrypting the binary content of an executable, the antivirus will not be able to read the binary instructions of the encrypted program, then you can decrypt it with the key (you can also encode it instead of encrypt it)
Anyways, a long answer isn't it ?
—
You are receiving this because you were mentioned.
Reply to this email directly, [view it on GitHub](#216 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/AUCSJAS3OU5S2WRFVJXLIH3TOLI6XANCNFSM4VYSRF5Q).
|
Hi, please read below the 2 comments I left for you. Thanks |
@partalian I think so, but i can't be sure of it, but i guess you should give up if it's not working with this new thing you buy... |
root@kali:/home/kali/Desktop/SigPloit# python sigploit.py
Traceback (most recent call last):
File "sigploit.py", line 16, in
from ss7.tracking import *
File "/home/kali/Desktop/SigPloit/ss7/tracking.py", line 14, in
import sigploit
File "/home/kali/Desktop/SigPloit/sigploit.py", line 21, in
from gtpmain import *
File "/home/kali/Desktop/SigPloit/gtpmain.py", line 12, in
import gtp.info
File "/home/kali/Desktop/SigPloit/gtp/info.py", line 18, in
from attacks.info import discover_gtp_nodes
File "/home/kali/Desktop/SigPloit/gtp/attacks/info/discover_gtp_nodes.py", line 39, in
from gtp_v2_core.utilities.configuration_parser import parseConfigs
File "/home/kali/Desktop/SigPloit/gtp/gtp_v2_core/utilities/configuration_parser.py", line 38, in
from configobj import ConfigObj, ConfigObjError
ImportError: No module named configobj
The text was updated successfully, but these errors were encountered: