govolution/avet

no reverse connections

pretech86 opened this issue · 3 comments

thanks for your effort , every thing run well but there's no reverse connection when i try win64 payload
the payload working on win10 and evade the antivirus except kaspersky but the main problem only there's no reverse connection

i have the same problem, i use "build_win32_meterpreter_unstaged_rev_https_40xshikata.sh" generate payload and attack target which is win7 x86 with tencent guanjia, and set msfconsole
use exploit/multi/handler
set payload set payload windows/meterpreter/reverse_https
without any alert with tencent guanjia, but there is no reverse connection
in addition, there is a cmd window when i execute the payload

Maybe "set lport=443" is missing? All other settings correct? Network connection OK? Does it work with a different payload?

For hiding console window add:
add_evasion hide_console
to the build script as shown in:
build_win32_meterpreter_rev_https_50xshikata_quiet.sh

Closed, no more feedback.