exploit/multi/handler
— Catch a shell produced using msfvenom. Note that you’ll need to useset payload
to tell Metasploit what it’s catching — for example,windows/meterpreter/reverse_tcp
(orwindows/x64/meterpreter/reverse_tcp
). Both regular reverse shells and meterpreter sessions can be caught this way.exploit/windows/smb/psexec
— Call PSExec over SMB (instantiates meterpreter by default). Only works ifSMBUser
has admin privileges on the target!
Note that any Windows exploit that requires a password will also accept an NTLM hash (the LMHash part can be replaced by an appropriately-sized string of 0 characters if not available).