hi
i was wondering what the difference between the two payloads
use payload/windows/meterpeter/reverse_tcp
and
use payload/windows/meterpeter_reverse_tcp
there are doc on all the exploit in metasploit ?
hi
i was wondering what the difference between the two payloads
use payload/windows/meterpeter/reverse_tcp
and
use payload/windows/meterpeter_reverse_tcp
there are doc on all the exploit in metasploit ?
1 Response
windows/x64/meterpreter/reversetcp = Staged Payload
windows/x64/meterpreterreversetcp = Non Staged Payload
In the first case, the payload is sent in two times, 1st for connection,2nd the payload.
In the second case, the entire payload is included in the exploit.
Share Your Thoughts