killchain-compendium/reverse shells/docs/msfconsole.md

13 lines
284 B
Markdown
Raw Normal View History

2021-08-23 01:13:54 +02:00
# metasploit reverse shell
```use multi/handler```
```sh
set PAYLOAD <payload>
set LHOST <listen-address>
set LPORT <liste-port>
exploit -j
```
* multi/handler is backgrounded. Therefore, `session 1` foregrounds the session.
* __LPORT under 1024__ user must be root or use sudo