-
Notifications
You must be signed in to change notification settings - Fork 348
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
which port should I listen on my computer? #7
Comments
The exploit has no knowledge of your IP, you must replace the USER_PAYLOAD portion in exploit.py with your own payload. If you want a reverse shell, you can use msfvenom to generate one. Ex: msfvenom come standards on Kali Linux which you can download from here: Ready made VMs can be downloaded from here: |
OK, Thranks! |
i tried, but only got bule screen ... my target windows is version win10 1903 (os build 18362.719) |
try it again, 2-3x, and if you can please report the stop code. thank you |
@chompie1337 i turned to another win10 1903 (os build 19362.356) and tried again, this time it didn't show bule screen. but the poc shows the following information:
|
which port should I listen on my computer?
default is 4444?
The text was updated successfully, but these errors were encountered: