Bug report
MiChaelinzo opened this issue · 12 comments
Running environment:
UFONet version v1.8 [e.g. 1.4]
Installation method Git [e.g. git]
Operating system: [ 0.000000] Linux version 5.16.0-kali5-amd64 (devel@kali.org) (gcc-11 (Debian 11.2.0-16) 11.2.0, GNU ld (GNU Binutils for Debian) 2.38) #1 SMP PREEMPT Debian 5.16.14-1kali1 (2022-03-15)
[e.g. Debian 4.19.16-1~bpo9+1 (2019-02-07) ]
Python version Python 3.9.11
[e.g. 3.7]
Target details:
-IP : 143.95.251.91
-IPv6 : OFF
-Port : 80
-Domain: aptechqatar.com
-Registrant : eNom, LLC
-Creation date: 2005-09-04 18:54:25
-Expiration : 2023-09-04 18:54:25
-Last update : None
Trying single visit broadband test (using GET)...
-Bytes in : 99.06 KB
-Load time: 2.14 seconds
Determining webserver fingerprint (note that this value can be a fake)...
-Banner: Microsoft-IIS/8.0
-Vía : NOT found!
Searching for extra Anti-DDoS protections...
-WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)
Searching at CVE (https://cve.mitre.org) for vulnerabilities...
-Last Reports:
+ CVE-2022-22835 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22835
+ CVE-2022-22834 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22834
+ CVE-2021-41679 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41679
+ CVE-2021-41678 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41678
+ CVE-2021-41677 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41677
+ CVE-2021-41244 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41244
+ CVE-2021-40651 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40651
+ CVE-2021-40637 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40637
+ CVE-2021-40636 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40636
+ CVE-2021-40635 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40635
[Info] [AI] Abduction finished! -> [OK!]
Attacking techniques [e.g. UFoSYN+LORIS+STARVATION]
WAF/IPS N/A -WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)
[if any]
Error details:
[Error] [AI] [Control] Cannot found [Zombies] from: 'botnet/zombies.txt' -> [Aborting!]
Relevant console output I have zombies in /botnet aliens.txt dns.txt dorks.txt droids.txt humans.txt ntp.txt rpcs.txt snmp.txt ucavs.txt zombies.txt
+550k listed zombies
[if any]
Exception traceback [if any]
Additional context Add any other context about the problem here.
I pulled Git before attacking
Bump
@MiChaelinzo -> Cannot found [Zombies] from: 'botnet/zombies.txt' <- Do you have this file at the correct place?
Check the file permissions. As you can see in the image you have shared, it has a different color to the rest of the files. This tells you that there is something different.
Another option is to move those files, re-clone the project and copy the content again, manually.
I tried using the software in my Parrot OS but it still have the same error, I changed the permission too... I have 2k zombies with it currently but I'll try to run it with it again.
@MiChaelinzo a few things:
1 - You don't need to run the tool as sudo (UFONet will ask you if needs to scale privileges, for example, to create network packets)
2 - It seems that your file botnet/zombies.txt is corrupt. Can not you replace it? (ex: python3 ufonet --download-zombies).If you have more entries in the file than the Community, you can add them later manually with a text editor.
If nothing this works, I recommend that you clone the tool again from the beginning.
Have you even checked the file yet? Can you see your zombies? @MiChaelinzo
@epsylon Yeah I tried running it with Parrot OS it is still not working... also I can't download in community
@dontbanmeplz Yeah I got 6 mil humans and using only 500k zombies...
@MiChaelinzo maybe server has firewalled you... just wait some days and try it again.
@MiChaelinzo maybe server has firewalled you... just wait some days and try it again.
I can download in Github, but this cannot find botnet/zombies.txt
is really weird I was able to attack last month but since updating my KL I can't anymore it's probably the environment? What OS are you using by the way?
I can attack on web-GUI but cannot in CLI... also can you recommend maximum number for zombies I'm currently running 12k but last month I was 500k. Shutdown some Russian website like cbr.ru, financials etc. web-gui for me is kinda slow and only uses dozen of zombies. I prefer using cli since it automate also udp, aliens, xcavs, and extra's
attacks?