jtpereyda / boofuzz

A fork and successor of the Sulley Fuzzing Framework
GNU General Public License v2.0
2.03k stars 345 forks source link

connection refused, boofuzz.exception.BoofuzzRpcError: unable to connect to server #545

Open AdeeshUnnikrishnan opened 3 years ago

AdeeshUnnikrishnan commented 3 years ago

Hi, i have been trying to fuzz the vulnserver for fuzzing ...am getting this below error

boofuzz.exception.BoofuzzRpcError: PED-RPC> unable to connect to server 192.168.3.9:26002. Error message: "[WinError 10061] No connection could be made because the target machine actively refused it"

machine - windows 10 I even checked using netstat -anop tcp, yet still no open port 26002

below is the code which i used (as mentioned in one of the issues_solved):

!/usr/bin/python

from boofuzz import *

target_ip = "192.168.3.9" options = {"proc_name" : "vulnserver.exe", "stop_commands": ['wmic process where (name="vulnserver.exe") delete'], "start_commands": ['C:\Users\TestUser\Downloads\vulnserver-master\vulnserver-master\vulnserver.exe']} procmon = ProcessMonitor(target_ip,26002) procmon.set_options(**options) monitors = [procmon] session = Session(target=Target(connection=SocketConnection(target_ip,9999, proto='tcp'),monitors=monitors),sleep_time=1)

s_initialize("user_command") s_string("KSTET") s_delim(" ",fuzzable=False) s_string("AAAA") s_static("\r\n") session.connect(s_get("user_command")) session.fuzz()

@jtpereyda

SR4ven commented 3 years ago

Did you start process_monitor.py on 192.168.3.9? If 192.168.3.9 is your localhost maybe try 127.0.0.1 as the target_ip instead. If you're running the process monitor on a remote machine check if you have any firewall rules blocking that traffic.