From cb4bf18125bfe1f11dedfed4802495b124199e77 Mon Sep 17 00:00:00 2001 From: cn-kali-team Date: Mon, 18 May 2020 16:29:34 +0800 Subject: [PATCH] Replace multibyte --- .../modules/payload/windows/meterpreter/reverse_tcp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/modules/payload/windows/meterpreter/reverse_tcp.md b/documentation/modules/payload/windows/meterpreter/reverse_tcp.md index bac6ce862d..3ea46c1b87 100644 --- a/documentation/modules/payload/windows/meterpreter/reverse_tcp.md +++ b/documentation/modules/payload/windows/meterpreter/reverse_tcp.md @@ -580,7 +580,7 @@ The route command in Meterpreter allows you change the routing table that is on The portfwd command allows you to talk to a remote service like it's local. For example, if you are able to compromise a host via SMB, but are not able to connect to the remote desktop service, then you can do: ``` -meterpreter > portfwd add –l 3389 –p 3389 –r [Target Host] +meterpreter > portfwd add -l 3389 -p 3389 -r [Target Host] ``` And that should allow you to connect to remote desktop this way on the attacker's box: