Closed Epicccal closed 3 years ago
Sorry, I think I found the problem. I need to specify the -a parameter because the default port for meterpreter communication is 4444。
@Epicccal Just one question, How did you performed this attack? The msfvenom binary with ..reverse_https payload and listener on other end, that's it right?
Hello , When I use JA3(S) to parse MetaSploit-Framework(6.0.37-dev) - windows/x64/meterpreter/reverse_https Payload, it does not work.
I don't understand the reason for this, could you give me some suggestions? Thank you very much~
msf_https.pcap.zip