Windows Command Shell, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)

1976-01-01T00:00:00
ID MSF:PAYLOAD/WINDOWS/SHELL/REVERSE_TCP_RC4_DNS
Type metasploit
Reporter Rapid7
Modified 1976-01-01T00:00:00

Description

Spawn a piped command shell (staged). Connect back to the attacker