Open AdeeshUnnikrishnan opened 3 years ago
Did you start process_monitor.py
on 192.168.3.9? If 192.168.3.9 is your localhost maybe try 127.0.0.1 as the target_ip instead.
If you're running the process monitor on a remote machine check if you have any firewall rules blocking that traffic.
Hi, i have been trying to fuzz the vulnserver for fuzzing ...am getting this below error
boofuzz.exception.BoofuzzRpcError: PED-RPC> unable to connect to server 192.168.3.9:26002. Error message: "[WinError 10061] No connection could be made because the target machine actively refused it"
machine - windows 10 I even checked using netstat -anop tcp, yet still no open port 26002
below is the code which i used (as mentioned in one of the issues_solved):
!/usr/bin/python
from boofuzz import *
target_ip = "192.168.3.9" options = {"proc_name" : "vulnserver.exe", "stop_commands": ['wmic process where (name="vulnserver.exe") delete'], "start_commands": ['C:\Users\TestUser\Downloads\vulnserver-master\vulnserver-master\vulnserver.exe']} procmon = ProcessMonitor(target_ip,26002) procmon.set_options(**options) monitors = [procmon] session = Session(target=Target(connection=SocketConnection(target_ip,9999, proto='tcp'),monitors=monitors),sleep_time=1)
s_initialize("user_command") s_string("KSTET") s_delim(" ",fuzzable=False) s_string("AAAA") s_static("\r\n") session.connect(s_get("user_command")) session.fuzz()
@jtpereyda