Hey great tool, however the reverse shell connection drops immediately.
I am not using the handler within the tool, I tried netcat listener and also metasploit exploit/handler and the same thing happens with both..
/wp-content/plugins/malicious/wetw0rk_maybe.php
-this file executes the reverse shell connection and it connects
/wp-content/plugins/malicious/QwertyRocks.php
-this file literally does nothing
I've tried it only visiting wetw0rk_maybe.php, and I've tried it visiting both consecutively as the tool hints at doing.
Either way the listener/handler catches the connection, but in MSF it automatically closes right after and with netcat as soon as i try to execute a command ("id") to test it; the connection closes.
What's the point of visiting both files to execute of wetw0rk_maybe.php executed the reverse shell and QwertyRocks.php does nothing?
Any ideas as to why the connection drops? Without assuming that it's the host's issue?
Using Kali 6.0.0 & zsh 5.9 - thanks!