From the course: Metasploit Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Creating and using a reverse shell
From the course: Metasploit Essential Training
Creating and using a reverse shell
- [Instructor] So far, we looked at generating client payloads. We then looked at creating handlers that will be connected to, from the reverse shell that comes in. Now we need to understand how to create those types of reverse shells. So first off, we need to kind of know what payloads are that handle that type of reverse connection from a machine. What we can do is come into here, we can say search type and then I can do payload and then I'm going to put the word reverse. So what this will do is list me the payloads based on the type of platform. You can see on the right hand side it says Windows. If I just scroll a little bit further through you can see different types of payloads shell reverse, TCP. You've got TCP inline, Reverse TCP, lots of X 64, et cetera. So there's a whole host of different types of payloads that handle this reverse connection. Now what we're going to do first is just do what we've done before.…
Contents
-
-
-
-
-
-
-
-
(Locked)
Generating client payloads10m 21s
-
(Locked)
Creating handlers for reverse shells4m 40s
-
(Locked)
Creating and using a reverse shell9m 14s
-
(Locked)
Understand how to bypass antivirus2m 56s
-
(Locked)
Exploit a windows workstation11m 22s
-
(Locked)
Use an office macro attack8m 57s
-
(Locked)
Bypass antivirus protection10m 53s
-
(Locked)
Bypass antivirus protection (Part 2)4m 59s
-
(Locked)
-
-