Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

no reverse connections #25

Closed
pretech86 opened this issue Apr 4, 2019 · 3 comments
Closed

no reverse connections #25

pretech86 opened this issue Apr 4, 2019 · 3 comments

Comments

@pretech86
Copy link

pretech86 commented Apr 4, 2019

thanks for your effort , every thing run well but there's no reverse connection when i try win64 payload
the payload working on win10 and evade the antivirus except kaspersky but the main problem only there's no reverse connection

@xuxuedong
Copy link

xuxuedong commented Apr 5, 2019

i have the same problem, i use "build_win32_meterpreter_unstaged_rev_https_40xshikata.sh" generate payload and attack target which is win7 x86 with tencent guanjia, and set msfconsole
use exploit/multi/handler
set payload set payload windows/meterpreter/reverse_https
without any alert with tencent guanjia, but there is no reverse connection
in addition, there is a cmd window when i execute the payload

@govolution
Copy link
Owner

Maybe "set lport=443" is missing? All other settings correct? Network connection OK? Does it work with a different payload?

For hiding console window add:
add_evasion hide_console
to the build script as shown in:
build_win32_meterpreter_rev_https_50xshikata_quiet.sh

@govolution
Copy link
Owner

Closed, no more feedback.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants