Create a reverse Meterpreter Payload using Metasploit

Meterpreter, Metasploit, Kali Linux and their are dozen of topics to be discussed; every tool, technique and procedure have their own merits and demerits and the usage depends on the objective of the attack. So what is Meterpreter? As offensive-security says:

“Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.”

Here is a wonderful tutorial on using Metasploit to create an EXE with the Meterpreter payload that creates a reverse TCP connection outbound, blowing through many NAT boxes and firewalls.

Create a reverse Meterpreter Payload using Metasploit Reviewed by Ethical Hacking on 11:00 AM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form


Email *

Message *

Powered by Blogger.