Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

does not connect to machine #3

Closed
ethicalhacker7192 opened this issue Aug 16, 2022 · 8 comments
Closed

does not connect to machine #3

ethicalhacker7192 opened this issue Aug 16, 2022 · 8 comments

Comments

@ethicalhacker7192
Copy link

the backdoor does not properly connect to the client machine via ip address how to fix

@ethicalhacker7192
Copy link
Author

the error message is ConnectionRefusedError: [WinError 10061] No connection could be made because the target machine actively refused it. (on the client machine)

@safesploit
Copy link
Owner

the error message is ConnectionRefusedError: [WinError 10061] No connection could be made because the target machine actively refused it. (on the client machine)

Can I presume the OS you are running the C2 server (c2.py) on is Windows?

@ethicalhacker7192
Copy link
Author

the c2.py is run on kali linux

@safesploit
Copy link
Owner

the c2.py is run on kali linux

Is the backdoor (backdoor.py) run in a Windows environment?

@ethicalhacker7192
Copy link
Author

yes

@safesploit
Copy link
Owner

yes

Could be a firewall issue. If you're using Windows Firewall is it blocking outbound ports?

Also, because you are running in different environments did you change the IP address in c2.py and backdoor.py?
As I used 127.0.0.1 (localhost) on port 5555.

@ethicalhacker7192
Copy link
Author

I had to change ip address from local host to inet on the backdoor.py since I have to connect from a distance and when I turn off the firewall the message still pops up

@safesploit
Copy link
Owner

Screenshot

The C2 server in the image is hosted on a VPS (running Ubuntu connected via SSH), and the backdoor (running on macOS) connects from another network over the Internet via a reverse shell.

PythonRAT/c2.py

Line 182 in 3db3591

sock.bind(('127.0.0.1', 5555))

The line above can be rewritten as sock.bind(('0.0.0.0', 5555)) in c2.py to bind to all IPv4 interfaces.

Likewise, backdoor.py must use the IPv4 address of your C2 server.

s.connect(('127.0.0.1', 5555))

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants