Create a reverse Meterpreter Payload using Metasploit
Meterpreter, Metasploit, Kali Linux and their are dozen of topics to be discussed; every tool, technique and procedure have their own merits and demerits and the usage depends on the objective of the attack. So what is Meterpreter? As offensive-security says:
“Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.”
Here is a wonderful tutorial on using Metasploit to create an EXE with the Meterpreter payload that creates a reverse TCP connection outbound, blowing through many NAT boxes and firewalls.
Create a reverse Meterpreter Payload using Metasploit Reviewed by Ethical Hacking on 11:00 AM Rating: