t3l3machus / hoaxshell

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
BSD 2-Clause "Simplified" License
2.99k stars 476 forks source link

Invoke-WebRequest and Invoke-Expression #15

Closed simonm2403 closed 1 year ago

simonm2403 commented 1 year ago

When I try to run the payload from my Linux Kali VMWARE machine on my Win11 pc, I get the Invoke-WebRequest cant establish a connection to remote desktop and Invoke-Expression : Cannot bind argument to parameter 'Command' because it is null.

Any ideas how to fix this?

t3l3machus commented 1 year ago

Hi, this seems like a networking problem. Are you sure the two machines can reach each other? I suggest yo run a simple python http server on the attacker machine and try to curl something from the victim to verify if they can communicate.

simonm2403 commented 1 year ago

I Tried to use the curl command on the victim machine, but cant seem to get a connection even though i'm using bridged as network adapter in VMware

t3l3machus commented 1 year ago

You must resolve the networking issue, then it will work just fine. Try different network adapter settings in VMware (maybe NAT?).