-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
unpack requires a string argument of length 4 #74
Comments
./client.py --encrypt --compress W.X.Y.Z 80 Somethings not right here. Please update when you've decided on a port. |
@BrandonFanti The output you're seeing is correct, the server lists on PORT, it hosts post-exploitation modules on PORT+1, hosts packages/libraries on PORT+2, and handles file uploads via incoming HTTP POST requests on PORT+3. |
Hello @malwaredllc ! Thanks for your work, and apologies if I am posting this in the wrong place; this is my first time ever reporting an issue on GitHub. I am experiencing more or less the same issue that Almazys was, and #124 did not appear to fix it for me. Here's a screenshot of the error I am having:
Here's some background:
Thanks for any insight! |
Hello again, @malwaredllc! I spent some time debugging my issue, and I was actually able to resolve it. Turns out, my issue was due to the fact that my virtual machine exists in an air-gapped network. This was a problem because when the payload attempts to create a C2 connection with the server, it tries to contact an external IP to retrieve geolocation information. The malware can't even get DNS information for that hostname, so it just fails. The following lines of code were the issue. After commenting them out, I was able to successfully create a C2 connection. [_get_info(self) - lines 1389-1392] To make a short story long, I tried running the malware as a python file instead of the executable, and I received this error: Eventually I found the geolocation code in the payload file and was able to remove it. |
@tdb1192 Good catch! I will add some handling for this in client payload initialization to prevent it from simply failing. |
When executing the python code generated by client.py, I have the following flooding output :
DEBUG:__main__:recv_task error: unpack requires a string argument of length 4
I generated 2 different client scripts through the following commands (problem occurs with both scripts) :
./client.py --encrypt --compress W.X.Y.Z 80
./client.py W.X.Y.Z 80
I ran the server with
./server.py --port 80
Here is the complete output from the client :
Am i doing something wrong ?
The text was updated successfully, but these errors were encountered: