Running a SEH BoF exploit script that contains a payload that is generated from msfvenom as such:
msfvenom --payload windows/shell/bind_tcp --format py --arch x86 --platform windows --bad-chars "\x00\x20" EXITFUNC=seh
After running the script containing the said payload, I checked all active connections on the victim machine (WinXp SP3) by running netstat -an, there is an open port listening on 4444 (the default port from msf payload). However on the attacker's machine (Fedora 27) I was not able to spawn the shell using netcat as such:
nc [victim IP] 4444
after running the above command the cursor just blinks below it. And after hitting enter (return), nc is killed and so is the vulnerable program from victim's PC. Anybody have any ideas?
The only possible explanation right now is that the problem lies within the payload from msfvenom? I assume that is because the payload was definitely executed since there was an open port at 4444 on the victim's PC. So if the problem did not exist while the script was running, then it must be the payload that is creating the problem, what do you guys think?