![]() ![]() Msf exploit(java_rhino) > set payload windows/meterpreter/reverse_tcp So let’s see the available options for that payload: The client can be written in any language but Metasploit has a full-featured Ruby client API. The server portion is implemented in plain C and is now compiled with MSVC, making it somewhat portable. Metepreter was originally written by skape for Metasploit 2.x, common extensions were merged for 3.x and is currently undergoing an overhaul for Metasploit 3.3. It features command history, tab completion, channels, and more. It communicates over the stager socket and provides a comprehensive client-side Ruby API. Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. ![]() There are a lot of good information regarding that payload at About the Metasploit Meterpreter: We want to use the windows/meterpeter/reverse_tcp payload. Generic/tight_loop normal Generic x86 Tight Loop Generic/shell_reverse_tcp normal Generic Command Shell, Reverse TCP Inline Generic/shell_bind_tcp normal Generic Command Shell, Bind TCP Inline ![]() Generic/debug_trap normal Generic x86 Debug Trap ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |