Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.64k
stars
590
forks
source link
VM using local IP address instead of public for LHOST #139
When generating a Netcat TCP payload, it uses the local IP address of the computer in the payload instead of the public IP for LHOST.
Making it so you can't connect from outside the local network.
Running on Windows 10 with Oracle VM, running Kali
Bridget Network, ports open to VM
when doing
generate payload=windows/netcat/... lhost=*IP*
It generates with the correct public IP, so this might be intended behavior, closing this issue
When generating a Netcat TCP payload, it uses the local IP address of the computer in the payload instead of the public IP for LHOST. Making it so you can't connect from outside the local network.
Running on Windows 10 with Oracle VM, running Kali Bridget Network, ports open to VM
Using default "python3_reverse_tcp_v2.py"