Generic Payload Handler
This module is a stub that provides all of the features of the Metasploit payload system to exploits that have been launched outside of the framework.
Module Name
exploit/multi/handler
Authors
- hdm <x [at] hdm.io>
- bcook-r7
Targets
- Wildcard Target
Platforms
- android
- apple_ios
- bsd
- java
- javascript
- linux
- osx
- nodejs
- php
- python
- ruby
- solaris
- unix
- windows
- mainframe
- multi
Architectures
- x86
- x86_64
- x64
- mips
- mipsle
- mipsbe
- mips64
- mips64le
- ppc
- ppce500v2
- ppc64
- ppc64le
- cbea
- cbea64
- sparc
- sparc64
- armle
- armbe
- aarch64
- cmd
- php
- tty
- java
- ruby
- dalvik
- python
- nodejs
- firefox
- zarch
- r
Reliability
Development
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/multi/handler
msf exploit(handler) > show targets
...targets...
msf exploit(handler) > set TARGET <target-id>
msf exploit(handler) > show options
...show and set options...
msf exploit(handler) > exploit