calebstewart / pwncat

Fancy reverse and bind shell handler
https://pwncat.readthedocs.io
MIT License
2.6k stars 254 forks source link

Windows Reverse Shell help #269

Open Dev-Sadwhite opened 1 year ago

Dev-Sadwhite commented 1 year ago

Bug Description

Hi, I'm trying to use pwncat-cs to be able to do a reverse shell with a rubber ducky but I can't find what command or what I have to put on the victim's computer. Do I have to install pwncat on the victim? The victim's operating system is windows (my laptop) I've been using some scripts from https://www.revshells.com but none of them work because I get an error in pwncat

pwncat version

0.5.4

Target System (aka "victim")

Windows 11 Home 22H2

Steps to Reproduce

Steps to reproduce the behavior:

1) start the listener in the attacker pc (kali linux) pwncat-cs -m windows -lp 9990 2) use the rubber ducky to inject a reverse shell to the attacker pc using powershell

Expected Behavior

a normal pwncat-cs session

Screenshots

no yet but you can ask for them

grav3m1nd-byte commented 1 year ago

A screenshot showing how it fails is below: image

When initiating pwncat-cs and then creating the listener fails as well, so it is not a command issue: image

@calebstewart, Have we found a way to resolve this?

Hi-Timofey commented 12 months ago

Same bug when trying to start windows listener with "pwncat-cs -m windows 0.0.0.0 2058".

Any updates on this bug? Request for further information or logs if needed.

Os - Manjaro Python 3.11.5