Jump to content

raypun

Members
  • Posts

    1
  • Joined

  • Last visited

raypun's Achievements

  1. I can't access my router interface because of our internet company's policies. so im port forwarding with ngrok to open a reverse tcp meterpreter shell on target. But problem is there's not any system authorized process on the target, post getsystem fails. So I use bypassuac exploits, up to date one is windows/local/bypassuac_comhijack. So i use it and set lhost as x.tcp.ngrok.io and as lport i use the port i forwarded(localport). But it says [*]Exploit completed, but no session was created. at the end. I tried lots of combinations like changing the port the one ngrok gave to me etc. but none of them worked.(I set ExitOnSession to false, choose the payload i used while creating the paylaoad (windows/x64/meterpreter/reverse_tcp) and it's not about exploit, this happens at every in system exploit) I don't know what to do anymore, can anyone using ngrok with metasploit or someon knows about these talk with me here? I need detailed help or a good alternative way of using ngrok to port forward.
×
×
  • Create New...