msf5 exploit (multi/handler) >

run

[*] Started reverse TCP handler

on 192.168.1.101:2345

[*] Sending stage (36 bytes)

[*] Commands shell session 1 opened

(192.168.1.101:2345->192.168.1.175:1129)

   
<sync_pundit>

hello....! This is Deon Trevor Mpofu

call me Sync_Pundit

<sync_pundit>

i like hacking and security

research and stuff..

<sync_pundit>

navigate the system to learn

more about me

<sync_pundit>

don't forget to check out

the blog too!

<sync_pundit>

break a leg :)

   
Commands:

whoami
ls
expertise
contact
blog
github
misc

   
root@syncpundit:~#
msf5 exploit (multi/handler) >

run

[*] Started reverse TCP handler on 192.168.1.101:2345

[*] Sending stage (36 bytes)

[*] Commands shell session 1 opened (192.168.1.101:2345 -> 192.168.1.175:1129)

   
<sync_pundit>

hello....! This is Deon Trevor Mpofu - call me Sync_Pundit

<sync_pundit>

i like hacking and security research and stuff..

<sync_pundit>

navigate the system to learn more about me

<sync_pundit>

don't forget to check out the blog too!

<sync_pundit>

break a leg :)

   
Commands:

whoami
ls
expertise
contact
blog
github
misc

   
root@syncpundit:~#