vlaz

  • Hi everyone !

    I am currently testing the possibility to use an external handler device, different from the attacker machine qith metasploit and I wonder if it is really possible :p
    Here is an example :

    I have from one hand the handler device waiting for reverse shell with this set up (IP = x.x.x.1) :

    use exploit/multi/handler
    set payload…[Read more]

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?