thanks alot for the reply, i will try it it out with my friend tomorrow.
Well yes the port 8080 was open when we were testing it but the problem ist not windows 10 security anymore, we managed to get the working session from windows 10 using
meterpreter/reverse_https and using ReverseListnerBindAddress command, we managed the connection, the problem now is something so weird that i have never
encountered it before.
So the problem is
my friend is using
hitron technologies CVE-30360 router and no matter what exploit or rat you use, this router seems super intelligent compare to other routers.
You can locally (on LAN) hack into any window through this router using metasploit but on INTERNET it seems ALMOST impossible.
these are the things we have tried so far
my friends windows 10 laptop which is 200 km away from me is connected to hitron technologies
CVE-30360 router.
So as long as it is connected to thing router, you will get no sessions on metasploit from it NONE it wont work, even darkcomet RATS (which doesnt work on window 10 anyway) wont work on older windows like xp and 7 or 8 even if all the PORTS are open all the security is down still you cant get anything from it through internet.....
but if you try metasploit and Darkcomet Rats LOCALLY, they work fine that router will allow local traffic to pass, locally you can exploit any window with metasploit
so now we thought let us disconnect out windows 10 laptop from hitron technologies CVE-30360 router and connect it to internet thought IPHONE 6 LTE tethering....
so we did that and what do you know? you get a session on metasploit, you can exploit the window 10 anyway you want, you can play around with data, cmd, webcam, keylog anythin UAC controls anything you want and when you connect it back to hitron technologies CVE-30360 everything stops and trust me all the ports are open we have tried Netcat listner, you can open backdoors yet still...
i mean i could be missing something but i really never experienced anything like this before...