PushpenderIndia / nekros

NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
BSD 3-Clause "New" or "Revised" License
116 stars 51 forks source link

Unable to Connect to Server! #4

Closed ittech25 closed 4 years ago

ittech25 commented 4 years ago

Windows 10 python 3.7 ==> OK install requirement ==> ok pip install image ==> ok mysql ==> Connect ok IIS localhost run php ==> test Machine ID // Request My Decryption OK

Upload Website Folder's Content to your server and update get_decrypt_code.php with right creds. present in website/php/ ==> DONE Create Database and Import nekros.sql in it. ==> DONE Update config.txt present in Ransomeware folder. ==> DONE Update config.txt present in db_manager folder to Manage database using GUI Window. ==> DONE $ python -m pip install requirements.txt ==> DONE Run main.py like this ==> ERROR

[*] Initiating Stage 1 ... [!] Unable to Connect to Server!

image

TEST Website ==> Query mySQL OK image

image

PushpenderIndia commented 4 years ago

Make sure you place all database creds in the config.txt otherwise, it will not be able to connect to the database

config.txt is placed inside Ransomeware folder

On Sun, 12 Apr, 2020, 5:51 PM ittech25, notifications@github.com wrote:

Windows 10 python 3.7 ==> OK install requirement ==> ok pip install image ==> ok mysql ==> Connect ok IIS localhost run php ==> test Machine ID // Request My Decryption OK Build ==> python main.py Error ==> [*] Initiating Stage 1 ... [!] Unable to Connect to Server!

[image: image] https://user-images.githubusercontent.com/63135414/79068621-84ca4600-7cf2-11ea-9772-c38f4ddd8d80.png

[image: image] https://user-images.githubusercontent.com/63135414/79068626-901d7180-7cf2-11ea-8f9f-88d5bc216a46.png

[image: image] https://user-images.githubusercontent.com/63135414/79068635-9dd2f700-7cf2-11ea-99bb-5d0a3fbc1198.png

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/Technowlogy-Pushpender/nekros/issues/4, or unsubscribe https://github.com/notifications/unsubscribe-auth/ANORYIWFOVTK444OSZ75UB3RMGW4RANCNFSM4MGMTRPQ .

ittech25 commented 4 years ago

Sure update config.txt in Ransomeware folder and inside db_manager folder and Website/php/get_decrypt_code.php.

Try change localhost to 127.0.0.1 but same error

PushpenderIndia commented 4 years ago

Please send the image of config.txt Maybe you are surrounding the creds with quotation

On Sun, 12 Apr, 2020, 6:34 PM ittech25, notifications@github.com wrote:

Sure update config.txt in Ransomeware folder and inside db_manager folder and Website/php/get_decrypt_code.php.

Try change localhost to 127.0.0.1 but same error

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/Technowlogy-Pushpender/nekros/issues/4#issuecomment-612611128, or unsubscribe https://github.com/notifications/unsubscribe-auth/ANORYISVWYPGKU2SFILJCFDRMG363ANCNFSM4MGMTRPQ .

ittech25 commented 4 years ago

image

Thank you for quick response

PushpenderIndia commented 4 years ago

Run stage1.py like this python stage1.py

Each stage and after_stage file can be executed individually

Stage1 file is responsible for database connection and decryption key and machine id creation

Just run it and find out the actual error

On Sun, 12 Apr, 2020, 6:40 PM ittech25, notifications@github.com wrote:

[image: image] https://user-images.githubusercontent.com/63135414/79069595-9c58fd00-7cf9-11ea-935f-2628ba6a255e.png

Thank you for quick response

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/Technowlogy-Pushpender/nekros/issues/4#issuecomment-612611887, or unsubscribe https://github.com/notifications/unsubscribe-auth/ANORYIUCV4YEE2IGSQEMH3DRMG4VHANCNFSM4MGMTRPQ .

ittech25 commented 4 years ago

hi @Technowlogy-Pushpender i run stage 1 with error output

image

ittech25 commented 4 years ago

Finally, error with mysql Fixed it :

SET @@GLOBAL.sql_mode= 'NO_AUTO_CREATE_USER,NO_ENGINE_SUBSTITUTION';

image

Thank you @Technowlogy-Pushpender support.