Closed bcnx closed 1 year ago
Hey, I compiled on a x64 host and copied everything over to the Pi and I was able to run both Python scripts. I do get this though: good response status: INVALID_PARAMETER
Is that something that can be helped?
Chers,
BC
Hey, this isn't really relevant to this repository. This question is about exploitation guidance and setup and not about any bug in the code itself.
To answer your question however: It should be as simple as specifying your listening hosts IP when you generate the payloads. Then on your listening host, start up metasploit and launch the multi handlers manually. I do this all the time if I need to egress out of an environment for any reason. If it is not working I would advise it's likely a networking issue or an issue on your listening host. That is all I can do to advise however, good luck!
Hi,
I'm doing my pentesting via a locally installed Pi that offers an OpenVPN connection for me. The Pi is in the LAN of the client and I use that in combination with a Kali install that connects via VPN.
I don't think I can compile the shellcode on the Pi, so I ded that on Kali. I cannot start the listener on Kali however,, because it has no IP on the client's LAN. It has a TUN interface in another range.
Can the code be changed so I can use a listener on another host?
Cheers,
BC