Hi,
I am doing the Stack-Based Buffer Overflows on Windows x86 module and section Remote Exploitation.
The remote CloudMe server is starting the reverse shell and I am seeing an incoming connection, but soon after the connection is dropped. I have looked my python script and the python script that the Module gives you and they are doing the same thing (ofcourse there is a difference in the msfvenom payload).
Why is the connection getting dropped? Am I doing something wrong?