devlinux Posted April 9, 2018 Share Posted April 9, 2018 So heres whats going on i made a shell, using reverse_tcp. And i put it on victims computer and opened it everything went smoothly in the process of opening the exe, anyways after i opened it, the shell didnt send a tcp connection back to me. Im doing this on a LAN network, both computers are right beside each other connected to ethernet. I made the exploit in a vm then uploaded it to mediafire and downloaded on other pc. But when i ran it, i didnt get a connection back it was like it was never ran. Heres all my console output currently even after opening i didnt take a screenshot but i did copy and paste. And put it on pastebin, so heres the link hopefully one of you can help me i would also like to say the the target pc had antivirus disabled. LINK: https://pastebin.com/R9G5nQGB I used port 4444 and my local ip. That link shows the whole process of setting up the payload and handler thats what all i did. Thanks to everyone who takes the time to read this i really need help. Quote Link to comment Share on other sites More sharing options...
i8igmac Posted April 9, 2018 Share Posted April 9, 2018 Run your exploit handler this should open port 4444. From another computer run nmap -p 4444 192.168.36.128 Is the port responding? Quote Link to comment Share on other sites More sharing options...
devlinux Posted April 9, 2018 Author Share Posted April 9, 2018 ok give me an hour I'm out eating right now, ill have to do it on parrot os as I don't got kali on my other one. Quote Link to comment Share on other sites More sharing options...
devlinux Posted April 9, 2018 Author Share Posted April 9, 2018 sorry about that hour tho, I cant come home rn will u be able to respond in a bit? Quote Link to comment Share on other sites More sharing options...
devlinux Posted April 9, 2018 Author Share Posted April 9, 2018 in about 30 minutes ill be on my pc to check Quote Link to comment Share on other sites More sharing options...
devlinux Posted April 9, 2018 Author Share Posted April 9, 2018 alright im finding my usb, to boot kali. Give me a bit Quote Link to comment Share on other sites More sharing options...
i8igmac Posted April 9, 2018 Share Posted April 9, 2018 You can perform a tcp scan from almost any device. Your cell phone could install a network scanning tool. You should maybe slow down with metasploit. learn the 3way hand shake and nmap from irongeeks website video tutorial. You need some networking knowledge to continue. Install a server. Anything like a game or webserver and learn how to properly configure so its accessible publicly. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.