Hi everyone !
I am currently testing the possibility to use an external handler device, different from the attacker machine qith metasploit and I wonder if it is really possible :p
Here is an example :
I have from one hand the handler device waiting for reverse shell with this set up (IP = x.x.x.1) :
set payload…[Read more]