Jump to content

Tobias6483

Members
  • Content Count

    4
  • Joined

  • Last visited

About Tobias6483

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hello guys. I wonder how i can use this module and payload on the internet, and not only local.. I tried with lhost= my kali linux ip and it worked for local pc'es. -> which is not what i want. I also tried using my public ip but that didn't work aswell as ping my ngrok connection to a 'real' ip -> that didn't work aswell. Neither did the lhost= ac0e9310ffee.ngrok.io which showed in my ./ngrok http 8080 shell. Module options (exploit/multi/script/web_delivery): Name Current Setting Required Description ---- --------------- -------- -----------
  2. Here is the compatible payloads when set to multi/script/web_delivery but as i mentioned "multi/meterpreter/reverse_http and https aswell as windows/meterpreter/reverse_http and https " doesn't work msfversion: =[ metasploit v6.0.30-dev ] + -- --=[ 2099 exploits - 1129 auxiliary - 357 post ] + -- --=[ 596 payloads - 45 encoders - 10 nops ] + -- --=[ 7 evasion Compatible Payloads =================== # Name Disclosure Date R
  3. Hello, my friends 🙂Im not from US/UK so I beg your indulgence.. I saw a cool topic about a method to create powershell payloads, so i carefully tried it out. SYSTEM: KALI LINUX Im using MSFPC(MSFVENOM PAYLOAD CREATER) to create a powershell payload on port 8080 Then i'm going to msfconsole. Here I was doing multi/script/web_delivery and was trying to set the payload to windows/meterpreter/reverse_https and http. That didn't work so i tried multi/meterpreter/reverse_https and http -> in both situations it came back with this "Exploit failed: multi/meterpreter/reverse_ht
×
×
  • Create New...