You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
bcook-r7
changed the title
Errno::ECONNRESET Connection reset by peer - SSL_accept while using windows/meterpreter/reverse_tcp
Stager fails to load using windows/meterpreter/reverse_tcp with badchars = '\0x00'
Oct 26, 2016
darn it, debug info being enabled by default seems to have caused the underlying problem (itself also a not-quite-explainable problem yet, but it does at least have a more general fix) - thanks @megabug for noticing this.
While testing this vulnerability for Metasploitable3, James and I are noticing windows/meterpreter/reverse_tcp is always causing this error:
Errno::ECONNRESET Connection reset by peer - SSL_accept
msfconsole output:
The backtrace:
If we use windows/shell_reverse_tcp, the payload session works properly. So at first glance, it problem seems more specific to meterpreter.
The text was updated successfully, but these errors were encountered: