EvilZone
Hacking and Security => Beginner's Corner => : theotheo36 October 23, 2015, 06:36:44 PM
-
I am fairly new to metasploit and I have by trying to learn ftp hacking. I set up a ftp server that I can connect to via public ip to simulate an across the internet scenario. I am using exploit/windows/ftp/open_ftpd_wbem and am running openftp on the ftp server. I am using payload windows/meterpreter/reverse_tcp. I have been reading many tutorials on how to set it up across the internet but none have worked. I forwarded port 443 and set lport to 443. Lhost is my public ip. Rhost is the public ip of the machine im trying to hack and rport is 21. Srvhost is my local ip and srvport is set to 443. This is what I figured I needed to do after reading many tutorials. This hasn't worked so I was wondering I was doing something wrong. My ISP might block port 443 from being forwarded and if it does would another port work or would the server not send packets there?
-
Not sure if I got you right, was the exploitation successful?
In reverse tcp payload, you give the victim side a RHOST and RPORT, and generate the payload.
When you're going to open a port for listening with msf on your machine (host), you DON'T GIVE IT A RHOST/RPORT! You just give it a LPORT and LHOST.
*Caution: Second time (when you want to listen and wait for the victim to connect back) you use the multi handler and give the payload name to it.
P.S.: I think you're mistaking reverse tcp with bind tcp..
-
Learn networking before you play with someone elses tool.
Locked until you promised you read a book on IP.