Metasploit Reverse Shell with a Webpage

Sep 13, 2015 07:19 AM

So im just starting to learn the command line version of metasploit, ive been using armitage for a while, but im not sure i can achieve what i want in armitage.

So here is what i am trying to achieve.

I have set rules in firewall to port forward to my Kali machine on a certain port.

I want to be able to make a website that spawns a reverse shell me to in metasploit, but when the person visits the website it spawns the shell and automatically forwards the person onto another website to make it look like nothing too weird happened.

So with metasploit i guess you can set up a listener and wait for the connection , then use metasploit command line kung fu ( this im learning ) or can you then export that shell into armitage?

Can armitage make a listener that will just wait for a connection, then add that host into the host list ?

Can someone help be my mentor in this area?

Thanks in advance.

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!