You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello, i've tried it based on your steps for scenario #1, and it doesn't work as it only appeared GET request and the meterpreter doesn't appear show eithe after clicking on the malicious rtf. I use python -m SimpleHTTPServer 80 on the attacker perspective, it shows that when i click the invoice.rtf, it shows /GET logo.doc instead of /GET shell.exe. Is it due to the script issues? Please advise!!
The text was updated successfully, but these errors were encountered:
Hello, i've tried it based on your steps for scenario #1, and it doesn't work as it only appeared GET request and the meterpreter doesn't appear show eithe after clicking on the malicious rtf. I use python -m SimpleHTTPServer 80 on the attacker perspective, it shows that when i click the invoice.rtf, it shows /GET logo.doc instead of /GET shell.exe. Is it due to the script issues? Please advise!!
The text was updated successfully, but these errors were encountered: