Forum Thread: Metasploit Payload

i was wondering what the difference between the two payloads

use payload/windows/meterpeter/reverse_tcp
use payload/windows/meterpeter_reverse_tcp

there are doc on all the exploit in metasploit ?

Join the Next Reality AR Community

Get the latest in AR — delivered straight to your inbox.

1 Response

windows/x64/meterpreter/reversetcp = Staged Payload
windows/x64/meterpreterreversetcp = Non Staged Payload
In the first case, the payload is sent in two times, 1st for connection,2nd the payload.
In the second case, the entire payload is included in the exploit.

Share Your Thoughts

  • Hot
  • Active