EntySec / HatSploit

Modular penetration testing platform that enables you to write, test, and execute exploit code.
https://hatsploit.com
MIT License
277 stars 62 forks source link

Netcat don't work right #61

Closed thecakeisfalse closed 3 years ago

thecakeisfalse commented 3 years ago

Netcat don't work right on target computer

On my computer

(hsf: exploit: Bind TCP Handler)> set PAYLOAD unix/generic/netcat_reverse_tcp
[i] PAYLOAD ==> unix/generic/netcat_reverse_tcp
(hsf: exploit: Bind TCP Handler)> run
[*] Establishing connection...
[*] Sending payload stage...
[*] Executing payload...
[*] Listening on port 8888...

On target computer

nc: invalid option -- 'e'
usage: nc [-46CDdFhklNnrStUuvZz] [-I length] [-i interval] [-M ttl]
      [-m minttl] [-O length] [-P proxy_username] [-p source_port]
      [-q seconds] [-s source] [-T keyword] [-V rtable] [-W recvlimit] [-w timeout]
      [-X proxy_protocol] [-x proxy_address[:port]]       [destination] [port]
enty8080 commented 3 years ago

@thecakeisfalse It's ok, not all computers have the normal version of Netcat and -e options removed for safety. Payload is not supported on targets like this. Use unix/generic/bash_reverse_tcp as alternative.