![]() TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 ![]() Here is the problem: I can't figure out my LHOST, when I try to exploit the meterpreter payload all I get is a failed to bind error( I think this is because My LHost is wrong)ฤก) use ifconfig in kali linux, however none of the things it shows seem to be my LHOST: `eth0: flags=41 I want to embed malicious code into a program, and when a victim opens it it will give me access to a meterpreter session on the device, for this i use an application named Shellter, which is a program used to embed metasploit payloads into applications. This is a problem that I have beaten my head over for quite some time.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |