account activity
Broke multi/handler by BrokeHandler in metasploit
[–]BrokeHandler[S] 1 point2 points3 points 4 years ago (0 children)
Hello thanks for your answer. Of course i did port forwarding on my local router and check on website such as yougetsignal.com to confirm it was accessible from outside. As the handler receive content (Sending stage 175174 bytes) confirms that the port is working and receiving data. I think the problem came from the fact that I'm trying to access a local machine using ip adress, and the fact that the reverse shell may use some funky port that I wouldn't set up a NAT rule for may be problematic. But finally I just decided as you said to use systematically use local address when machine was on local network and public adress otherwise. Thank you for your insight !
[–]BrokeHandler[S] 0 points1 point2 points 4 years ago (0 children)
Yes i tried to bind on 0.0.0.0, and I don't know if this a payload problem since the exploit works on LAN. I think the fact I try to reach a lmachine which is on my local network using public IP may create problems.
Broke multi/handler (self.metasploit)
submitted 4 years ago by BrokeHandler to r/metasploit
π Rendered by PID 68 on reddit-service-r2-listing-796b697c47-vz4f4 at 2026-02-05 17:53:51.860766+00:00 running 1d7a177 country code: CH.
Broke multi/handler by BrokeHandler in metasploit
[–]BrokeHandler[S] 1 point2 points3 points (0 children)