Create a Payload and Listener
La rubrique Create a Payload and Listener permet de façon relativement simple de générer un payload et d’exécuter un listener au sein de Metasploit.
Ainsi, les actions suivantes permettent de créer un fichier malveillant exécutant un reverse Meterpreter :
set> 4
1) Windows Shell Reverse_TCP Spawn a command shell on
victim and send back to attacker
2) Windows Reverse_TCP Meterpreter Spawn a meterpreter shell
on victim and send back to attacker
3) Windows Reverse_TCP VNC DLL Spawn a VNC server on victim
and send back to attacker
4) Windows Shell Reverse_TCP X64 Windows X64 Command Shell,
Reverse TCP Inline
5) Windows Meterpreter Reverse_TCP X64 Connect back to the
attacker (Windows x64), Meterpreter
6) Windows Meterpreter Egress Buster Spawn a meterpreter shell
and find a port home via multiple ports
7) Windows Meterpreter Reverse HTTPS Tunnel communication over
HTTP using SSL and use Meterpreter
8) Windows Meterpreter Reverse DNS Use a hostname instead of
an IP address and use Reverse Meterpreter
9) Download/Run your Own Executable Downloads an executable and
runs it
...