Forum Thread: When I Use Any Meterpreter/reverse_http/S Payload, It Starts a Reverse Https Server Binded to

When I use the above reverse payload, it binds to when my LHOST is set to

I am very new to this, and I don't understand what I can do to fix this.

I am using a Asus chromebook C200 with a crouton based Kali Linux on usb.

Join the Next Reality AR Community

Get the latest in AR — delivered straight to your inbox.

3 Responses

Don't worry. That is what it should do. The IP address is your webserver.

That's because you are entering an IP address which is not assigned to any interface (a wrong IP address), metasploit brings the listener to all interfaces ( in that case.

Type ifconfig to see your IP address.

Ok. To further my situation on this:

I am using kali nethunter with windows/mterpreter/reverse_https
My phone's IP Address is
My computer's IP address is
lhost is set to & lport is 4444

When the exploit is executed the payload is downloaded from my phone it seems, but it doesn't create a session to my laptop.

I have no idea why this is?

Share Your Thoughts

  • Hot
  • Active