I tried a Powershell-based revshell - NetCat - MSFVenom Payload, PowerCat etc. No matter what method I use to create a reverse connection to my PwnCat listener (on Kali) I always get the following error (see screenshot).
pwncat version
Provide the output of pwncat --version or a commit hash if working from
a development branch.
0.4.3
$ pwncat --version
0.4.3
Target System (aka "victim")
Provide as much detail about the target host as possible. If this is a TryHackMe
Windows 10 - 21H1
Virtual Machine
No Antivirus
No Firewall
Steps to Reproduce
Steps to reproduce the behavior:
See screenshot to start a listener and create a reverse shell (no matter what method I use)
Yes, I also get error while tried to get a reverse shell from TryHackMe windows machines. Every time it gives an error. I hope developers will fix it soon.Best of luck💗✌️
Bug Description
I tried a Powershell-based revshell - NetCat - MSFVenom Payload, PowerCat etc. No matter what method I use to create a reverse connection to my PwnCat listener (on Kali) I always get the following error (see screenshot).
pwncat version
Provide the output of
pwncat --version
or a commit hash if working from a development branch. 0.4.3Target System (aka "victim")
Provide as much detail about the target host as possible. If this is a TryHackMe Windows 10 - 21H1 Virtual Machine No Antivirus No Firewall
Steps to Reproduce
Steps to reproduce the behavior:
Expected Behavior
An interactive shell