Execute Reverse PHP Shell with Metasploit

May 11, 2016 12:21 AM
May 11, 2016 12:38 AM

I used the php/meterpreter/reverse tcp and setup my lhost and my lport. Next, I copied the payload and placed it all in payload here ?>.

I setup a server with a page containing the vulnerable php payload and setup a exploit/multi/handler with the same lhost/lport and with the payload: php/meterpreter/reverse tcp.

On the victim computer, ran wget url to payload but there was no shell obtained! Why so? No firewall, attacker is on kali, victim on metasploitable2.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!