Chatterbox

A set of hints for this box is to audit the exploit script (do not use metasploit exploit), and see what it’s doing first.

Run the application on virtual machine (recommend windows 7)

do not use meterpreter/reverse_tcp as shell, this is why the service keeps crashing.

Use regular windows reverse shell (do not use meterpreter please), and you will have a stable shell.

Get your payload/exploit working locally first then move to live box.

Should be easy from there.