.. / msfvenom_rev_sh_bof
Star

Metasploit way to generate a reverse shell.

Command Reference:

Payload: The payload to generate, such as “linux/x64/shell_reverse_tcp”

Listening Host: Your machine, used to listen for incoming connections

Listening Port: Port on which you are listening for connections

Format: (-f) Executable format, c in this case, which stands for C-language

Architecture: x86 (32-bit) in this case

Bad chars: The Bad characters (only the null byte in this case, which is always a bad char)

Command: Copy References: