Accidentally open a reverse TCP meterpreter connection

Tags:
Hacking
Network security
Security
Can I get in trouble for accidentally opening a reverse TCP meterpreter connection to a malware scanning website? I was testing out if my meterpreter exe file was detectable with some online sandbox analyser when I got a meterpreter session in armitage. I used clearev because I read that will erase all security logs and then I killed the session. So is this illegal and can I get in trouble for it? It was an accident.


Software/Hardware used:
Metasploit
0

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • Kevin Beaver
    I can't imagine accidentally opening a meterpreter connection, especially given all of the steps and skills required to set all of that up. Did the host's owner detect it? Was there malicious intent? What damages did you cause? IF anything were to ever come of it, the mere fact that you're asking this question in a public forum could ultimately be traced. Will that happen? See questions above.
    27,505 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: