Reverse Shell
Make sure nmap is installed on the target and source machines
Windows
https://nmap.org/download.html#windows
Linux
Run the following command on the source machine to listen for traffic on a specified port. (linux)
On the victim machine run the following command to connect to the source machine over port 87. (Linux Target)
Note: This command is an example of a payload. A script that runs this command can be put onto a machine through a link etc. In the Metasploit project we will look into more advanced payloads(.
Attacking a Windows Machine
Command to listen on port 87 for Windows traffic.
Pass the following command to start the reverse shell and connect to the attacker.
Last updated