|Main Archive Page > Month Archives > metasploit-framework archives|
On 2/28/2011 6:13 AM, JOhn Mistikopoulos wrote:
> And then, the listener stops giving any other info.
> I went to the victim PC and realized that the payload exe had already dies.
> I couldn't see it on the task manager.
> Concurrently, I had been running wireshark.
> The two last packets were:
> 1. Victim => Listener (RST, ACK)
> 2. Listener => Victim (FIN, ACK)
> Finally I don't get any connections.
> Does anyone know how to fix this?
Is there any network proxy/filter between the target and yourself? Is
the target running an endpoint protection product or HIPS? Is the target
process a user-process (IE) or a system process (assuming IE/user-land)?
The reverse_https payload is finicky based on the WinInet profile of the
user running the code.