jtpereyda / boofuzz

A fork and successor of the Sulley Fuzzing Framework

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

connection refused, boofuzz.exception.BoofuzzRpcError: unable to connect to server

AdeeshUnnikrishnan opened this issue · comments

Hi,
i have been trying to fuzz the vulnserver for fuzzing ...am getting this below error

boofuzz.exception.BoofuzzRpcError: PED-RPC> unable to connect to server 192.168.3.9:26002. Error message: "[WinError 10061] No connection could be made because the target machine actively refused it"

machine - windows 10
I even checked using netstat -anop tcp, yet still no open port 26002

below is the code which i used (as mentioned in one of the issues_solved):
#!/usr/bin/python

from boofuzz import *

target_ip = "192.168.3.9"
options = {"proc_name" : "vulnserver.exe", "stop_commands": ['wmic process where (name="vulnserver.exe") delete'], "start_commands": ['C:\Users\TestUser\Downloads\vulnserver-master\vulnserver-master\vulnserver.exe']}
procmon = ProcessMonitor(target_ip,26002)
procmon.set_options(**options)
monitors = [procmon]
session = Session(target=Target(connection=SocketConnection(target_ip,9999, proto='tcp'),monitors=monitors),sleep_time=1)

s_initialize("user_command")
s_string("KSTET")
s_delim(" ",fuzzable=False)
s_string("AAAA")
s_static("\r\n")
session.connect(s_get("user_command"))
session.fuzz()

@jtpereyda

Did you start process_monitor.py on 192.168.3.9? If 192.168.3.9 is your localhost maybe try 127.0.0.1 as the target_ip instead.
If you're running the process monitor on a remote machine check if you have any firewall rules blocking that traffic.