Replies: 1 comment
-
@sanchious Thank you for opening a discussion. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
@lem0nSec Very interesting implementation. Thank you for the work you've done. Have you tried testing this with meterpreter staged payloads such as windows/x64/meterpreter/reverse_tcp or windows/x64/meterpreter/reverse_https?
I am having troubles getting a fully functioning meterpreter session - it dies.
ex:
**_msf6 exploit(multi/handler) > run
[] Started reverse TCP handler on 192.168.1.235:443
[] Sending stage (336 bytes) to 192.168.1.196
[-] Command shell session 3 is not valid and will be closed
[*] 192.168.1.196 - Command shell session 3 closed._**
Thanks in advance!
Beta Was this translation helpful? Give feedback.
All reactions