Hi guys !
Im new to Metasploit and followed a few tutorials on reverse tcp.
I made a successful connection from my kali linux to my lab windows pc (webcam_start and all this stuff work)
My question is...how can i remove this shell from windows machine ? How is this shell working ? Is there any file or line of code created on windows pc ? As i understand, the victim pc (my windows pc) will make a call to ip and port that a set in metesploid ..so is this just one time call or the victim pc making this call in some periods ?
I mean i found a lot of tutorials on how to use metasploit reverse tcp but none one how its works, so mby just a link to some tut could do :)
Thank you
1 Response
Unless you set persistence, once a connection is terminated, you would have to reestablish a connection if you want to. The shell connection stops. No trace is left on the target computer.
Share Your Thoughts