Skip to content

Listeners

Johnny Watts edited this page Apr 12, 2024 · 4 revisions

Listeners

Use the listeners menu to craft and quickly deploy metasploit listeners. Choose from Windows x86/x64, Linux x86/x64, Mac/OSX, and Android listeners.

  • From the main menu, choose Option 1 to load the listeners menu to craft and quickly deploy Metasploit listeners. Choose from Windows x86/x64, Linux x86/x64, Mac/OSX, and Android listeners.

KSploit Listeners

  • Press enter to continue

KSploit Listeners Menu

Windows Meterpreter Reverse TCP Listener

  • Press 1 to craft and deploy a Windows x64 Meterpreter Reverse TCP listener

  • Enter the attacker ip (probably one of the 'current adapter address(es)' shown on screen)

KSploit Listeners Menu Windows

  • Enter the port to listen on (i.e. 4444)

KSploit Listeners Menu Windows Port

  • KSploit will create and save the listener script and then deploy the listener in msfconsole

KSploit Listeners Menu Windows Listening

Use this listener with Windows x86 Meterpreter Reverse TCP Payload

Use this listener with Windows x64 Meterpreter Reverse TCP Payload

Linux Meterpreter Reverse TCP Listener

  • Press 2 to craft and deploy a Linux x64 Meterpreter Reverse TCP listener
  • Enter the attacker ip (probably one of the 'current adapter address(es)' shown on screen)

KSploit Listeners Menu Linux

  • Enter the port to listen on (i.e. 4444)

KSploit Listeners Menu Linux Port

  • KSploit will create and save the listener script and then deploy the listener in msfconsole

KSploit Listeners Menu Linux Listening

Use this listener with Linux x86 Meterpreter Reverse TCP Payload

Use this listener with Linux x64 Meterpreter Reverse TCP Payload

OSX Reverse TCP Listener

  • Press 3 to craft and deploy an OSX Meterpreter Reverse TCP listener
  • Enter the attacker ip (probably one of the 'current adapter address(es)' shown on screen)

KSploit Listeners Menu OSX

  • Enter the port to listen on (i.e. 4444)

KSploit Listeners Menu OSX Port

  • KSploit will create and save the listener script and then deploy the listener in msfconsole

KSploit Listeners Menu OSX Listening

Use this listener with Mac OSX Reverse TCP Payload

Android Reverse TCP Listener

  • Press 4 to craft and deploy a Android Reverse TCP listener
  • Enter the attacker ip (probably one of the 'current adapter address(es)' shown on screen)

KSploit Listeners Menu Android

  • Enter the port to listen on (i.e. 4444)

KSploit Listeners Menu Android Port

  • KSploit will create and save the listener script and then deploy the listener in msfconsole

KSploit Listeners Menu Android Listening

Use this listener with Android Reverse TCP Payload