Need help with windows/meterpreter/reverse_tcp
Hello all, this is the first post I have created, however I have been soaking up information from here for a long time. I searched the forum and google first so I hope this is not a dupe question in any way. With that said on to the question.
I am trying to use the windows/meterpreter/reverse_tcp payload across the internet. I have configured the payload to connect to my external ip on port 31337. I have forwarded the port in my router to a workstation running a exploit/multi/handler listening on port 31337. The handler never receives any traffic coming from the victim. After executing the exploit/payload on the victim computer looking at netstat I see a connection to the external ip on the correct port. Do you guys know what I am doing wrong or have any suggestions on how I can make this successful?