From the course: Metasploit Essential Training

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Creating and using a reverse shell

Creating and using a reverse shell

From the course: Metasploit Essential Training

Creating and using a reverse shell

- [Instructor] So far, we looked at generating client payloads. We then looked at creating handlers that will be connected to, from the reverse shell that comes in. Now we need to understand how to create those types of reverse shells. So first off, we need to kind of know what payloads are that handle that type of reverse connection from a machine. What we can do is come into here, we can say search type and then I can do payload and then I'm going to put the word reverse. So what this will do is list me the payloads based on the type of platform. You can see on the right hand side it says Windows. If I just scroll a little bit further through you can see different types of payloads shell reverse, TCP. You've got TCP inline, Reverse TCP, lots of X 64, et cetera. So there's a whole host of different types of payloads that handle this reverse connection. Now what we're going to do first is just do what we've done before.…

Contents