msf5 exploit (multi/handler) > | run |
[*] Started reverse TCP handler on 192.168.1.101:2345 |
[*] Sending stage (36 bytes) |
[*] Commands shell session 1 opened (192.168.1.101:2345 -> 192.168.1.175:1129) |
<sync_pundit> | hello....! This is Deon Trevor Mpofu - call me Sync_Pundit |
<sync_pundit> | i like hacking and security research and stuff.. |
<sync_pundit> | navigate the system to learn more about me |
<sync_pundit> | don't forget to check out the blog too! |
<sync_pundit> | break a leg :) |
Commands: | |
whoami |
|
root@syncpundit:~# |