So im just starting to learn the command line version of metasploit, ive been using armitage for a while, but im not sure i can achieve what i want in armitage.
So here is what i am trying to achieve.
I have set rules in firewall to port forward to my Kali machine on a certain port.
I want to be able to make a website that spawns a reverse shell me to in metasploit, but when the person visits the website it spawns the shell and automatically forwards the person onto another website to make it look like nothing too weird happened.
So with metasploit i guess you can set up a listener and wait for the connection , then use metasploit command line kung fu ( this im learning ) or can you then export that shell into armitage?
Can armitage make a listener that will just wait for a connection, then add that host into the host list ?
Can someone help be my mentor in this area?
Thanks in advance.