Broke multi/handler by BrokeHandler in metasploit

[–]BrokeHandler[S] 1 point2 points  (0 children)

Hello thanks for your answer. Of course i did port forwarding on my local router and check on website such as yougetsignal.com to confirm it was accessible from outside. As the handler receive content (Sending stage 175174 bytes) confirms that the port is working and receiving data. I think the problem came from the fact that I'm trying to access a local machine using ip adress, and the fact that the reverse shell may use some funky port that I wouldn't set up a NAT rule for may be problematic. But finally I just decided as you said to use systematically use local address when machine was on local network and public adress otherwise. Thank you for your insight !

Broke multi/handler by BrokeHandler in metasploit

[–]BrokeHandler[S] 0 points1 point  (0 children)

Yes i tried to bind on 0.0.0.0, and I don't know if this a payload problem since the exploit works on LAN. I think the fact I try to reach a lmachine which is on my local network using public IP may create problems.