Suppose I want to do a USB drive by (Samy Kamkar) which involves a USB that will take action as a HID and will open a reverse shell to my metasploit listener.
However, the machine which will be running metasploit listener will not be alive when I will exploit the victim, I am not sure how metasploit listeners work, will I have to purchase a server online that will run the listener? or will it recognize a connection when I switch on my pc?
Comments
No Comments Exist
Be the first, drop a comment!