We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
no connection when checking. has anyone encountered this problem ?
C2 server log error:
socks5 settings
just checking via proxychains
havoc is listening on port 3386
some tcpdump logs: 100.100.100.100 - HAVOC C2 100.100.100.100.3386 - socks5
sudo tcpdump -i any port 3386 -n tcpdump: data link type LINUX_SLL2 tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes 21:48:15.072286 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [SEW], seq 1577557269, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 21:48:15.072334 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0 21:48:16.072891 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [SEW], seq 1577557269, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 21:48:16.072934 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0 21:48:17.095932 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0 21:48:17.113020 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [.], ack 1, win 1026, length 0 21:48:17.114605 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [P.], seq 1:4, ack 1, win 1026, length 3 21:48:17.114630 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 4, win 502, length 0 21:48:17.114681 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [P.], seq 1:3, ack 4, win 502, length 2 21:48:17.132273 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [P.], seq 4:14, ack 3, win 1026, length 10 21:48:17.175872 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 14, win 502, length 0 21:48:32.135918 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 14, win 502, length 0 21:48:32.149806 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [F.], seq 14, ack 3, win 1026, length 0
The text was updated successfully, but these errors were encountered:
No branches or pull requests
no connection when checking. has anyone encountered this problem ?
C2 server log error:
socks5 settings
just checking via proxychains
havoc is listening on port 3386
some tcpdump logs:
100.100.100.100 - HAVOC C2
100.100.100.100.3386 - socks5
sudo tcpdump -i any port 3386 -n
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:48:15.072286 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [SEW], seq 1577557269, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
21:48:15.072334 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
21:48:16.072891 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [SEW], seq 1577557269, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
21:48:16.072934 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
21:48:17.095932 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
21:48:17.113020 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [.], ack 1, win 1026, length 0
21:48:17.114605 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [P.], seq 1:4, ack 1, win 1026, length 3
21:48:17.114630 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 4, win 502, length 0
21:48:17.114681 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [P.], seq 1:3, ack 4, win 502, length 2
21:48:17.132273 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [P.], seq 4:14, ack 3, win 1026, length 10
21:48:17.175872 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 14, win 502, length 0
21:48:32.135918 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 14, win 502, length 0
21:48:32.149806 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [F.], seq 14, ack 3, win 1026, length 0
The text was updated successfully, but these errors were encountered: