Msfvenom
Help menu
List available options for module type
Payload option
Format option
Note: The output from msfvenom provides the shellcode (typically written in assembly language) that can be executed on the target architecture; defined by the -p
flag. The -f
flag simply specifies the format for which the shellcode should be in.
Eg. Powershell
[Byte[]] $buf = 0xfc,0x48,0x83,...
Eg. C
unsigned char buf[] = "\xfc\x48\x83...
Eg. Python
buf = b""
buf += b"\xfc\x48\x8
buf += b"\...
A script/program (in the specific language) which executes the shellcode provided by msfvenom is still required to be created.
Example
linux/x86/meterpreter/reverse_tcp
Module to use on the attacking machine to catch a shell
exploit/multi/handler
Run the shellcode on the target machine
Gain meterpreter shell on the attacker machine
Using post exploitation hash dump module
Last updated