You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
i have been trying to fuzz the vulnserver for fuzzing ...am getting this below error
boofuzz.exception.BoofuzzRpcError: PED-RPC> unable to connect to server 192.168.3.9:26002. Error message: "[WinError 10061] No connection could be made because the target machine actively refused it"
machine - windows 10
I even checked using netstat -anop tcp, yet still no open port 26002
below is the code which i used (as mentioned in one of the issues_solved):
#!/usr/bin/python
Did you start process_monitor.py on 192.168.3.9? If 192.168.3.9 is your localhost maybe try 127.0.0.1 as the target_ip instead.
If you're running the process monitor on a remote machine check if you have any firewall rules blocking that traffic.
Hi,
i have been trying to fuzz the vulnserver for fuzzing ...am getting this below error
boofuzz.exception.BoofuzzRpcError: PED-RPC> unable to connect to server 192.168.3.9:26002. Error message: "[WinError 10061] No connection could be made because the target machine actively refused it"
machine - windows 10
I even checked using netstat -anop tcp, yet still no open port 26002
below is the code which i used (as mentioned in one of the issues_solved):
#!/usr/bin/python
from boofuzz import *
target_ip = "192.168.3.9"
options = {"proc_name" : "vulnserver.exe", "stop_commands": ['wmic process where (name="vulnserver.exe") delete'], "start_commands": ['C:\Users\TestUser\Downloads\vulnserver-master\vulnserver-master\vulnserver.exe']}
procmon = ProcessMonitor(target_ip,26002)
procmon.set_options(**options)
monitors = [procmon]
session = Session(target=Target(connection=SocketConnection(target_ip,9999, proto='tcp'),monitors=monitors),sleep_time=1)
s_initialize("user_command")
s_string("KSTET")
s_delim(" ",fuzzable=False)
s_string("AAAA")
s_static("\r\n")
session.connect(s_get("user_command"))
session.fuzz()
@jtpereyda
The text was updated successfully, but these errors were encountered: