24/7 Metasploit Listener?

Jan 15, 2017 07:05 PM

Suppose I want to do a USB drive by (Samy Kamkar) which involves a USB that will take action as a HID and will open a reverse shell to my metasploit listener.

However, the machine which will be running metasploit listener will not be alive when I will exploit the victim, I am not sure how metasploit listeners work, will I have to purchase a server online that will run the listener? or will it recognize a connection when I switch on my pc?

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!