Jump to content

atlas

Members
  • Posts

    2
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

atlas's Achievements

Newbie

Newbie (1/14)

  1. So you're saying I should only need to forward the ports on my router and not the victims? I'm fairly certain when I was testing this I had the "attack" computer set as DMZ-host in the router config, so all ports should have been open.... -A
  2. Hi guys, Recently I have had success testing SET with different browser payloads to get a shell on a local network. However, when I try to "pop my box" from outside the network, I can't get a meterpreter shell. I can get the page and run the malicious applet, but no shell... ie\ Computer A is running the webserver hosting a malicious java applet, it serves it to the broader internet at http://whatever.dyndns.org:1234 Computer B, connected to a totally different network halfway across the world connects to Computer A's webserver and presses yes to run the malicious java applet. In this situation I cannot seem to get a Meterpreter shell on Computer B. The page/applet are served fine by Computer A and recieved fine by Computer B, but no shell is opened. Does Computer B require a port to be forwarded? Should I use a different listen port? Any info appreciated guys
×
×
  • Create New...