I put the topic in “other” category cause not due to the machine or either htb itself, put there’s no way for me to get a reverse-shell on any machine. Same problem on tryhackme.
My tun0 is set, i can nmap the machine and do everything i need, but everytime i try to get a reverse shell (from metasploit / other reverse-shell or scripts) my netcat did’nt catch anything on the specific port (the shell is send on the htb IP tun0 of course).
I’m running ovpn on Ubuntu 20 without any vm, i tried to purge and reinstall ovpn and netcat, reset the .ovpn file, disable my firewall and tryied on tryhackme too, but same same. I have no idea where the problem come from. I didn’t tryied on another computer tho.
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.10.14.11 netmask 255.255.254.0 destination 10.10.14.11
exemple: python3 usermap_script.py 10.10.10.3 445 10.10.14.11 4444
but netcat didn’t catch anything just "Listening on 0.0.0.0 4444
I’m not sure if the problem come from
i tried to search on the forum to see if anyone already had the problem but didn’t see anything, so here i am
Thanks for answers