Metasploit Reverse Shell with a Webpage

Sep 13, 2015 07:19 AM

So im just starting to learn the command line version of metasploit, ive been using armitage for a while, but im not sure i can achieve what i want in armitage.

So here is what i am trying to achieve.

I have set rules in firewall to port forward to my Kali machine on a certain port.

I want to be able to make a website that spawns a reverse shell me to in metasploit, but when the person visits the website it spawns the shell and automatically forwards the person onto another website to make it look like nothing too weird happened.

So with metasploit i guess you can set up a listener and wait for the connection , then use metasploit command line kung fu ( this im learning ) or can you then export that shell into armitage?

Can armitage make a listener that will just wait for a connection, then add that host into the host list ?

Can someone help be my mentor in this area?

Thanks in advance.

Related Articles

637587411395252764.jpg

How to Perform Advanced Man-in-the-Middle Attacks with Xerosploit

635211718118959676.jpg

How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number

Comments

No Comments Exist

Be the first, drop a comment!