Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

JA3(s) can not parse windows/x64/meterpreter/reverse_https Payload #65

Closed
Epicccal opened this issue May 6, 2021 · 2 comments
Closed

Comments

@Epicccal
Copy link

Epicccal commented May 6, 2021

Hello , When I use JA3(S) to parse MetaSploit-Framework(6.0.37-dev) - windows/x64/meterpreter/reverse_https Payload, it does not work.

msf_https

2021-05-06_09-53

I don't understand the reason for this, could you give me some suggestions? Thank you very much~

msf_https.pcap.zip

@Epicccal
Copy link
Author

Epicccal commented May 6, 2021

Sorry, I think I found the problem. I need to specify the -a parameter because the default port for meterpreter communication is 4444。

2021-05-06_10-35

2021-05-06_10-35_1

@Epicccal Epicccal closed this as completed May 6, 2021
@Jackson-Pollock
Copy link

@Epicccal Just one question, How did you performed this attack? The msfvenom binary with ..reverse_https payload and listener on other end, that's it right?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants