You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
thanks for your effort , every thing run well but there's no reverse connection when i try win64 payload
the payload working on win10 and evade the antivirus except kaspersky but the main problem only there's no reverse connection
The text was updated successfully, but these errors were encountered:
i have the same problem, i use "build_win32_meterpreter_unstaged_rev_https_40xshikata.sh" generate payload and attack target which is win7 x86 with tencent guanjia, and set msfconsole
use exploit/multi/handler
set payload set payload windows/meterpreter/reverse_https
without any alert with tencent guanjia, but there is no reverse connection
in addition, there is a cmd window when i execute the payload
thanks for your effort , every thing run well but there's no reverse connection when i try win64 payload
the payload working on win10 and evade the antivirus except kaspersky but the main problem only there's no reverse connection
The text was updated successfully, but these errors were encountered: