You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 10, 2024. It is now read-only.
The source of reverse_http problem is "Payload UUID"!
In the rev_http.py generated UUID for HTTP GET request is not in correct format (Payload UUID format ) and metasploit listener don't answer to incorrect Payload UUID.
The quick fix is capture a correct Payload UUID and use it in C# source code.
The complete fix is rewrite generate UUID method in C#!
I work on it but I get error when copy time into 4Byte array :(
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Veil version
3.1.12
OS Used - all info (architecture, linux flavor, etc)
kali 2019
metasploit 5.0.37
How did you install Veil? (Apt, Clone from Github, etc.)
apt
Did you run the setup script?
no
Pastebin link to error you are encountering (include console actions you took prior to error)
use 9 OR 10 OR 11
set LHOST metasploitIP
set LPORT 4444
Expected behavior
Session open, but don't open any session!
I think it works last mount ago.
Any additional info you want to tell me
The text was updated successfully, but these errors were encountered: