epsylon/ufonet

Bug report

MiChaelinzo opened this issue · 12 comments

Running environment:

UFONet version v1.8 [e.g. 1.4]
Installation method Git [e.g. git]
Operating system: [ 0.000000] Linux version 5.16.0-kali5-amd64 (devel@kali.org) (gcc-11 (Debian 11.2.0-16) 11.2.0, GNU ld (GNU Binutils for Debian) 2.38) #1 SMP PREEMPT Debian 5.16.14-1kali1 (2022-03-15)
[e.g. Debian 4.19.16-1~bpo9+1 (2019-02-07) ]
Python version Python 3.9.11
[e.g. 3.7]
Target details:
-IP : 143.95.251.91
-IPv6 : OFF
-Port : 80

-Domain: aptechqatar.com
-Registrant : eNom, LLC
-Creation date: 2005-09-04 18:54:25
-Expiration : 2023-09-04 18:54:25
-Last update : None


Trying single visit broadband test (using GET)...

-Bytes in : 99.06 KB
-Load time: 2.14 seconds


Determining webserver fingerprint (note that this value can be a fake)...

-Banner: Microsoft-IIS/8.0
-Vía : NOT found!


Searching for extra Anti-DDoS protections...

-WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)


Searching at CVE (https://cve.mitre.org) for vulnerabilities...

-Last Reports:

    + CVE-2022-22835 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22835

    + CVE-2022-22834 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22834

    + CVE-2021-41679 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41679

    + CVE-2021-41678 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41678

    + CVE-2021-41677 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41677

    + CVE-2021-41244 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41244

    + CVE-2021-40651 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40651

    + CVE-2021-40637 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40637

    + CVE-2021-40636 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40636

    + CVE-2021-40635 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40635

[Info] [AI] Abduction finished! -> [OK!]

Attacking techniques [e.g. UFoSYN+LORIS+STARVATION]
WAF/IPS N/A -WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)
[if any]

Error details:
[Error] [AI] [Control] Cannot found [Zombies] from: 'botnet/zombies.txt' -> [Aborting!]

Relevant console output I have zombies in /botnet aliens.txt dns.txt dorks.txt droids.txt humans.txt ntp.txt rpcs.txt snmp.txt ucavs.txt zombies.txt +550k listed zombies
[if any]
Exception traceback [if any]
Additional context Add any other context about the problem here.
I pulled Git before attacking

Bump

@MiChaelinzo -> Cannot found [Zombies] from: 'botnet/zombies.txt' <- Do you have this file at the correct place?

Screenshot 2022-04-13 163237

Yeah I do

Check the file permissions. As you can see in the image you have shared, it has a different color to the rest of the files. This tells you that there is something different.

Another option is to move those files, re-clone the project and copy the content again, manually.

I tried using the software in my Parrot OS but it still have the same error, I changed the permission too... I have 2k zombies with it currently but I'll try to run it with it again.

SADScreenshot 2022-04-20 172156

I tried moving mv and chmod etc. still doesn't work is it my KALI environment... I just want to target a corrupt Marcos politicians here in PH...

@MiChaelinzo a few things:

1 - You don't need to run the tool as sudo (UFONet will ask you if needs to scale privileges, for example, to create network packets)

2 - It seems that your file botnet/zombies.txt is corrupt. Can not you replace it? (ex: python3 ufonet --download-zombies).If you have more entries in the file than the Community, you can add them later manually with a text editor.

If nothing this works, I recommend that you clone the tool again from the beginning.

Have you even checked the file yet? Can you see your zombies? @MiChaelinzo

@epsylon Yeah I tried running it with Parrot OS it is still not working... also I can't download in community
UFOScreenshot 2022-04-21 101647
@dontbanmeplz Yeah I got 6 mil humans and using only 500k zombies...

@MiChaelinzo maybe server has firewalled you... just wait some days and try it again.

@MiChaelinzo maybe server has firewalled you... just wait some days and try it again.

I can download in Github, but this cannot find botnet/zombies.txt is really weird I was able to attack last month but since updating my KL I can't anymore it's probably the environment? What OS are you using by the way?

I can attack on web-GUI but cannot in CLI... also can you recommend maximum number for zombies I'm currently running 12k but last month I was 500k. Shutdown some Russian website like cbr.ru, financials etc. web-gui for me is kinda slow and only uses dozen of zombies. I prefer using cli since it automate also udp, aliens, xcavs, and extra's attacks?