t3l3machus / hoaxshell

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Invoke-WebRequest and Invoke-Expression

simonm2403 opened this issue · comments

commented

When I try to run the payload from my Linux Kali VMWARE machine on my Win11 pc, I get the Invoke-WebRequest cant establish a connection to remote desktop and Invoke-Expression : Cannot bind argument to parameter 'Command' because it is null.

Any ideas how to fix this?

Hi, this seems like a networking problem. Are you sure the two machines can reach each other?
I suggest yo run a simple python http server on the attacker machine and try to curl something from the victim to verify if they can communicate.

commented

I Tried to use the curl command on the victim machine, but cant seem to get a connection even though i'm using bridged as network adapter in VMware

You must resolve the networking issue, then it will work just fine. Try different network adapter settings in VMware (maybe NAT?).