

Since single payloads are self-contained, they can be caught with non-metasploit handlers like netcat for example. These can be as simple as running calc.exe, adding a user to the system or deleting a file. Singles are payloads that are self-contained and completely standalone. There are 3 types of payload modules in the Metasploit framework: In short: an exploit module will access the system, a payload module defines what will be done on that machine after the system was successfully accessed. In Metasploit, a payload is a special module that can be used to work with an exploit module that will take advantage of a vulnerability in the system.
#NETCAT WINDOWS XP BACKDOOR CODE#

In this blog post we'll dig a little deeper and explore the post-exploitation possibilities of using a more advanced payload: the Meterpreter. As an example I used the Eternalblue exploit to get a simple command shell with local system rights on a Windows configuration that didn't have the latest updates.
#NETCAT WINDOWS XP BACKDOOR HOW TO#
In a previous article I described how to get started with the Metasploit framework.
