Windows 10 Reverse Shell Fails to be Established
See original GitHub issueBug Description
pwncat terminates with the error connection failed: channel receive timed out: b''
a few seconds after receiving a connection from a Windows 10 reverse shell
pwncat version
$ pwncat --version
0.4.3
Target System (aka “victim”)
The system in question is “Algernon” from Offensive Security Proving Grounds
Steps to Reproduce
- Run exploit for RCE vulnerability in SmarterMail: https://www.exploit-db.com/exploits/49216
Expected Behavior
pwncat should establish a fully-interactive (Windows) reverse shell
Screenshots
As shown in the following screenshot, netcat successfully receives the reverse powershell shell.
Issue Analytics
- State:
- Created 2 years ago
- Reactions:1
- Comments:5 (1 by maintainers)
Top Results From Across the Web
Powershell reverse shell fails on Windows 7 / Windows 10 #36
Hello! All windows payloads must run from cmd.exe. The error you mentioned is caused due you are trying to run it from powershell.exe;....
Read more >Reverse shell breaking instantly after connection has been ...
It's working! You not just provided a working answer (which may I would have found out by myself via try and error), but...
Read more >Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
https://j-h.io/plextrac SUPER thankful for PlexTrac for supporting the channel and sponsoring this vide -- try their premiere reporting ...
Read more >How we were able to bypass Windows Defender on a ... - Elteni
... Windows Defender on a Windows 10 machine to get a reverse shell! ... you sprayed the password and found a machine that...
Read more >hoaxshell - An unconventional Windows reverse shell ...
The generated payload will work only for the instance it was generated for. Use the -g option to bypass this behavior and re-establish...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
ah cool, well maybe there is no need for that staged C2, I though I could just use pwncat to handle multiple nc sessions, since there isn’t any good tools for that afaik
Windows support is currently in a… precarious state…
pwncat
utilized a staged C2 which is currently to disk. Windows Defender has a detection specifically forpwncat
and blocks it from executing, which is my initial thought when I see problems like this.There could also be other issues. For example, many Windows shell implementations do not actually provide full STDIO access for the shell. A lot of them line buffer the IO, which will break
pwncat
when it tries to spawn the C2 (assuming that the C2 isn’t blocked by Defender).I need to revisit the Windows implementation within pwncat soon, but haven’t had the time.