February 22, 2018, 02:54:49 AM
Welcome, Guest. Please login or register.

"640 K ought to be enough for anybody." -- Bill Gates

Author Topic: Metasploit session error  (Read 836 times)

Offline ErSecco

  • Top Hat Member
  • Prospect
  • ********
  • Posts: 17
  • Internets: +0/-1
Metasploit session error
« on: October 27, 2015, 03:28:41 PM »
Hi Guys! I got this error on metasploit

msf exploit(handler) > exploit

  • Started HTTP reverse handler on
  • Starting the payload handler...
  • (UUID: d94ed4fbd394298f/python=20/python=21/2015-10-27T21:35:54Z) Staging Native payload ...
  • [-] Exception handling request: undefined method `[]' for nil:NilClass

     I've shared port 4444 on the router for my local IP.
    where I have mistaked?

Estimate yourself and you will be estimated

Offline Ð4NG3RΩµ$ @£TØ1Ð

  • Prospect
  • *
  • Posts: 4
  • Internets: +0/-0
Re: Metasploit session error
« Reply #1 on: January 29, 2016, 10:37:08 PM »
I've been here before. Instead of putting your LHOST as or or its actual IP (local), put the routers IP in there. Should work if you are wanting to get a stable meterpreter shell after forwarding from your Internet facing router.

I ran into this before when I was trying to figure out the same issue. I was doing a SE gig and the person would click on a malicious Excel document and I would lose a shell. Did that ^above and it worked.